multiple choice questions with answers on network management systems

78
NETWORK MANAGEMENT SYSTEMS 1 CHAPTER 1: DATA COMMUNICATION & NETWORK MANAGEMENT OVERVIEW 1>The architecture of the telephone network is hierarchical (true/false)__________ 2>In telephone network model, there are ____levels of network switches and ____types of trunks that connect these switches (3/5/5) 3>__________is a logical link between two switches that may traverse one or more physical links (loop/trunk) 4>In telephone network model, the end office is the __________in the hierarchy (lowest/highest) 5>figure 1.1__________ 6>Match the following Regional center : class 4 switch Sectional center : class 5 switch Primary center : class 1 switch Toll center : class 3 switch End office : class 2 switch 7>In telephone network model, the customer's telephone or PBX which is a switch on the customer premises , is connected to the end office via a dedicated link called___________ (trunk/loop) 8>Toll switches carry long distance calls (true/false)___________ 9>DDD stands for___________ 10>In telephone network model, _______ (DET/DDD)network enables up to dial the far end telephone w/o an operator’s assistance, comprises___ transmission trunks (2/3/4) 11>Match the following direct trunk :connects any two toll offices toll connecting trunk :connects an end office to any toll office toll (internal) trunks :connects two end offices 12>In telephone network model , a circuit connection is set up a: directing using a local trunk b: via the higher level switches and routes Ans :__________ (a/b/either) 13>In telephone network model, primary and secondary routes are already programmed into the___________ (bridge/switch) 14>Operations support systems ensure the quality of service in the telephone network (true/false)___________ 15>The quality of the call, measured in terms of SNR is measured regularly by a trunk maintenance system________ (true/false) 16>NOC stands for__________ 17>For a given region, there is ___________where the global status of the network is monitored (PBX/NOC) 18>___________is the nerve center of telephone network operations (PBX/NOC) 19>The telephone network is managed from the perspective o_________ (service provider/user)20>In telephone network, with the emphasis on the users' point of view, the first objective in operations is_____ and then ______ (quality & economy of service/restoration of service) 21>POTS stands for___________ 22>___________communications technology deals with the theories of electrical engineering, computer engineering, and computer science and their application to all types of communications over networks (telecommunication/data/network) 23>A basic network can be viewed is interconnected ________ (nodes/links/both) 24>___________carrier information from one node to another that is directly connected to it (network/link) 25>A node behaves as a: end node b: intermediate node Ans:___________ (a/b/both) 26>If the node behaves as_____ node, information either originates or terminates there. ______node redirects the information from one link to another (intermediate/end) 27>In telephone network model, End office nodes behaves as___________ (intermediate/end) 28>Each ___________node has connection to a user interface , if the information originates or terminates there (intermediate/end) 29>DTE stands for___________ 30>___________is any equipment that generates or accepts digital data (DDD/DTE)

Upload: ekthatiger633590

Post on 22-Dec-2015

209 views

Category:

Documents


7 download

DESCRIPTION

MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

TRANSCRIPT

Page 1: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

1

CHAPTER 1: DATA COMMUNICATION &

NETWORK MANAGEMENT OVERVIEW

1>The architecture of the telephone network is hierarchical (true/false)__________

2>In telephone network model, there are ____levels of network switches and ____types of trunks that connect

these switches (3/5/5)

3>__________is a logical link between two switches that may traverse one or more physical links (loop/trunk)

4>In telephone network model, the end office is the __________in the hierarchy (lowest/highest)

5>figure 1.1__________

6>Match the following

Regional center : class 4 switch

Sectional center : class 5 switch

Primary center : class 1 switch

Toll center : class 3 switch

End office : class 2 switch

7>In telephone network model, the customer's telephone or PBX which is a switch on the customer premises , is

connected to the end office via a dedicated link called___________ (trunk/loop)

8>Toll switches carry long distance calls (true/false)___________

9>DDD stands for___________

10>In telephone network model, _______ (DET/DDD)network enables up to dial the far end telephone w/o an

operator’s assistance, comprises___ transmission trunks (2/3/4)

11>Match the following

direct trunk :connects any two toll offices

toll connecting trunk :connects an end office to any toll office

toll (internal) trunks :connects two end offices

12>In telephone network model , a circuit connection is set up

a: directing using a local trunk

b: via the higher level switches and routes

Ans :__________ (a/b/either)

13>In telephone network model, primary and secondary routes are already programmed into the___________

(bridge/switch)

14>Operations support systems ensure the quality of service in the telephone network (true/false)___________

15>The quality of the call, measured in terms of SNR is measured regularly by a trunk maintenance

system________ (true/false)

16>NOC stands for__________

17>For a given region, there is ___________where the global status of the network is monitored (PBX/NOC)

18>___________is the nerve center of telephone network operations (PBX/NOC)

19>The telephone network is managed from the perspective o_________ (service provider/user)20>In telephone

network, with the emphasis on the users' point of view, the first objective in operations is_____ and then ______

(quality & economy of service/restoration of service)

21>POTS stands for___________

22>___________communications technology deals with the theories of electrical engineering, computer

engineering, and computer science and their application to all types of communications over networks

(telecommunication/data/network)

23>A basic network can be viewed is interconnected ________ (nodes/links/both)

24>___________carrier information from one node to another that is directly connected to it (network/link)

25>A node behaves as

a: end node

b: intermediate node

Ans:___________ (a/b/both)

26>If the node behaves as_____ node, information either originates or terminates there. ______node redirects the

information from one link to another (intermediate/end)

27>In telephone network model, End office nodes behaves as___________ (intermediate/end)

28>Each ___________node has connection to a user interface , if the information originates or terminates there

(intermediate/end)

29>DTE stands for___________

30>___________is any equipment that generates or accepts digital data (DDD/DTE)

Page 2: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

2

31>Data can be transmitted in

a: analog format

b: digital format

Ans:___________ (a/b/either)

32>The __________data is sent either as base band or on top of a carrier (digital/analog)

33>___________data is generated either directly by the user equipment or as analog data and converted to digital

data (digital/analog)

34>ISDN stands for___________

35>Long distance data transmission today is mostly ___________due to its superior price and performance

(digital/analog)

36>The data can be transmitted in following modes

a: circuit switches

b: message switched

c: packet switches

Ans:___________ (a/b/c/all)

37>In__________ switched mode , a physical circuit is established between the originating and terminating ends

before the data is transmitted (circuit /

message/ packet switches)

38>In_____ &______switched modes, the data is broken into packets and each packet is enveloped with the

destination and originating addresses (circuit /

message/ packet switches)

39>___________switched mode is used to send long messages such as email (circuit /

message/ packet switches)

40>___________switched mode is used to transmit small packets used in applications such as interactive

communication (circuit /

message/ packet switches)

41>In telephone network, _____&_____open each packet to find the destination address and forward the data to

the appropriate output links (switch/bridge/router)

42>In _________switched mode, each packet may take a different route (circuit/packet)

43>The main difference between packet and message switching is that in the ___________the data is stored by the

system and then retrieved by the user at the later time (former/latter)

44>In___________ switched mode, the packets are fragmented and reassembled in almost real time

(message/packet)

45>email is an example of_________ switched mode (message/packet)

46>PSDN stands for___________

47>Network communications are classified as either _____or______ communication (tele/wireless/data)

48>Telecommunication network is a __________switched network that is structured as a public network accessible

by any user (message/circuit)

49>Data communication network is also called computer communication network (true/false)___________

50>___________transfer the information from digital to analog at source and back to digital at destination

51>In corporate data and telecommunication networks, the computer terminals are connected to___________

which manages the local terminals and provides a single interface to the telephone network (onsite switch

PBX/onsite communication controller)

52>In corporate data and telecommunication networks, the telephones are connected locally by ___________

which interfaces to the telephone network (onsite switch PBX/onsite communication controller)

53>Processor to processor communications over the telecommunications lines take _____time and therefore

are______ expensive (less/more)

54>SNA stands for___________

55>In SNA, the host is connected to the terminals via the _____controllers and ______controllers

(communications/cluster/both)

56>In SNA, _____ controllers manage the DTEs at the peripheral nodes and the ______controllers manage the

traffic at the subnetwork levels (communications/cluster/both)

57>DCE stands for___________

58>The system of links that connect remote LANs is called___________ (MAN/WAN)

59>A LAN is physically connected to a WAN link by ______or _____at each end (switch/bridge/router)

60>Important aspects of DCEs are

a: the different platforms and applications running on DCEs have the ability to communication with each other

b: the ability of the processors attached to LANs do multiple functions

Ans: ___________ (a/b/both)

61>The processor that requests a service is called the _____, and the processor that provides the service is called

the______ (server/client)

Page 3: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

3

62>The process that initiates a transaction to run an application in either a local or remote processor is called the

_____.The application process that is invoked by a _____ is called the______ (server/client)

63>In client/server architecture, the ____initiates the request and the _______responds (server/client)

64>Client cannot initiate a process in the server (true/false)___________

65>A real world analogy of the client/server operation is a post office (true/false)___________

66>The communication between operative computing processes is called ___________communication (end to

end/peer to peer)

67>___________is a suite of protocols that enable networks to be interconnected (UDP/IP or TCP/IP)

68>IP is a _____ protocol. TCP is a ______protocol. UDP is a ______protocol (connection

oriented/connectionless)

69>Most of Internet traffic really uses___________ because of the reliability of data transmission (UDP/IP or

TCP/IP)

70>The Internet is a network of networks (true/false)___________

71>___________serve as the interface between dissimilar and independent , autonomous , networks and perform

many functions including protocol conversions (routers/gateways)

72>Autonomous networks have little knowledge each other's attributes , configurations and addresses and yet

communication is automatically facilitated by a hierarchy of Internet servers along the path

(true/false)___________

73>Email messages are transmitted by a___________ scheme all along the path (stop & wait/ store & forward)

74>Internet users are currently doubling n population each year (true/false)___________

75>In layered architecture, the workstations belong to the___________ plane (LAN/user)

76>in layered architecture, the interfaces are defined as the fabrics (true/false)___________

77>In Internet fabric model, the LAN and WAN planes interface through _____fabric. The WANs in the WAN

plane interface via the______ fabric (gateway/switching)

78>In Internet fabric model, the user's workstation interfaces to a LAN via a ___________interface

(gateway/switching/MAC)

79>In Internet fabric model, LANs interface to a WAN by a switching fabric of ___________

(bridges/routers/switches/all)

80>____________fabric interconnects different WANs (gateway/switching)

81>_____is a private network and access to it is controlled by the enterprise that owns it, whereas______is public

(internet/intranet)

82>In communication lingo, commonality can be interpreted as _____and procedures as______

(protocols/standards)

83>___________can be defined as the basic structure of a system that shows its functional components and the

relationships among the

84>___________architecture describes the functional components of a communication network as well as the

operational interfaces among them (network/communication)

85>The operational procedures are specified in terms of ___________ (standards/protocols)

86>Standardization of___________ involves agreement in the physical characteristics and operational procedures

of communication equipment that performs similar functions (policy/protocol)

87>Email exchange across the world is possible because most vendors have adopted the standard ___________in

their software (MIME/SMTP)

88>Each system can be divided into ______broad sets of communication layers (2/3/4)

89>in communication architecture , top set of layers consists of the _____layers and the bottom set of the______

layers (transport/application)

90>The data can be transmitted in one of____ modes (2/3/4)

91>The ISO has developed a highly modular or layered , architecture for communication protocols that is called

the OSI reference model , published as OSI RM--ISO______ (7948/749)

92>OSI reference model was developed based on the premise that

a: the different layers of protocol provide different services

b: each layer can communicate with only its own neighboring level

Ans:___________ (a/b/both)

93>In OSI reference model, two systems can communicate on a ___________level (end to end/peer to peer)

94>In OSI reference model, layers __ __are the transport system protocol layers; and layers ______are application

support protocol layers (1/2/3/4/5/6/7)

95>In OSI reference model, the intermediate system is involved only up to the first ________layers in the process

(3/4)

Page 4: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

4

96>Match the following

Physical :provides application specific protocols for each application and each transport protocol

system

Data link :establishes and clears sessions for applications, and thus minimizes loss of data during large

data exchange

Network :forms the switching/routing layer of the network

Transport :multiplexes and de-multiplexes messages from applications

Session :transfers to and gathers from the physical medium raw bi data

Presentation :Consists of two sublayers LLC and MAC

Application :provides a set of standard protocols so that the display would be transparent to syntax of the

application

97>_____formats the data to go on the medium; performs error control and flow control.______ controls data

transfer to and from LAN; resolves conflicts with other data on LAN (MAC/LLC)

98>Identify feature of transport layer in OSI reference model

a: multiplexes and demultiplexes messages from applications

b: acts as a transparent layer to applications and thus isolates them from the transport system layers

c: makes and breaks connections for connection-oriented communication

d: controls flow of data in both directions

Ans:___________ (a/b/c/d/all)

99>Identify features of physical layer in OSI reference model

a: provides a set of standard protocols so that the display would be transparent to syntax of the application

b: transfers to and gathers from the physical medium bit data

c: data encryption and decryption

d: handles physical and electrical interfaces to the transmission medium

Ans:___________ (a/b/c/d/all)

100>Identify features of presentation layer in OSI reference model

a: provides a set of standard protocols so that the display would be transparent to syntax of the application

b: transfers to and gathers from the physical medium bit data

c: data encryption and decryption

d: handles physical and electrical interfaces to the transmission medium

Ans:___________ (a/b/c/d/all)

101>In OSI reference model , the message in each layer is contained in message units called__________

102>PDU consist of _____parts (2/3)

103>PDU consists of ____&______ (PCI/VCI/UD)

104>In PDU , ____contains header information about the layer while ______contains the data that he layer , acting

as a service provider , receives from or transmits to the upper layer/service user layer (PCI/UD)

105>In OSI reference model, the size of the PDU increases as it goes toward _______layers (higher/lower)

106>__________layer is responsible for physically placing the electrical signal on the physical medium and picking

up the signal from it (presentation/physical)

107>__________layer controls and manages the physical and electrical interfaces to the physical medium including

the connector or transceiver (presentation/physical)

108>There are various protocol standards for physical layer interface, _____classes of standards have been

established by the ITU-T and EIA (2/3)

109>ITU-T stands for__________

110>EIA stands for__________

111>The data communication between two DTEs is controlled and managed by __________layer (network/data

link)

112>In data link layer, the data communication is serial __________oriented stream (bit/byte)

113>functions of data link layer are

a: establish and clear the link

b: transmit the data

c: error control and data compression

d: flow control

Ans:__________ (a/b/c/d/all)

114>Flow control on the data link layer is done on a hop to hop basis (true/false)__________

115>In data link layer, the lower __________layer controls the access and transmittal of data to the physical layer

in an algorithm manner (LLC/MAC)

116>There are _____basic forms of LANs (2/3)

117>Ethernet LAN:____ type: :FDDI:____ type (ring/bus)

Page 5: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

5

118>features of network layer are

a: controls and manages the switching fabric of the network

b: provides both connectionless network service and connection oriented network service

Ans:________ (a/b/both)

119>CLNS stands for___________

120>CONS stands for__________

121>__________is used when the lower layers are highly reliable such as LANS and bridges as well as when the

messages are short (CONS/CLNS)

122>__________is the method for transmitting long messages such as file transfer (CONS/CLNS)

123>__________is used when the transmission medium is not reliable (CONS/CLNS)

124>___________at the nodes of a network performs the function of routing and switching the data (switch/router)

125>The OSI architecture model divides the network layer into ________sublayers (2/3/4)

126>Sublayers of network layer are

a: SNICP

b: SNDCP

c SNDAP

Ans:_________ (a/b/c/all)

127>SNICP stands for___________

128>SNDCP stands for__________

129>SNDAP stands for___________

130>In network layer , the top sublayer is _________that interfaces to the transport layer (SNICP/SNDCP/SNDAP)

131>The Internet communicates between nodes using an Internet address and _____.The nodes in turn

communicate with subnetworks using_____ which depends on the subnetwork protocol (SNICP/SNDCP/SNDAP)

132>The SNDCP communicates with is data link layer via the third network sublayer___________

(SNICP/SNDAP)

133>In OSI terminology, TCP/IP is called __________ (ISO-IP/ISO-CLNP/either)

134>A connection ____OSI protocol is X.25 PLP, a packet layer protocol (less/oriented)

135>Identify feature of transport layer

a: multiplexes the user data provided by the application layers and passes the packets to the network layer

b: service is independent of the network on which the packets are transmitted

c: can be connectionless or connection oriented and is implemented in both Internet and OSI protocols

d: flow control is implemented and functions as a data rate manager between the application programs and the

network layer

Ans:__________ (a/b/c/d/all)

136>Layers ___through ___application layer protocols (4/5/6/7)

137>__________layer establish the communication at the beginning of the session, monitor , synchronize and error

correct the information exchanged during the session and then release the logical link at the end of the session

(presentation/session)

138>__________layer is the medium of presentation of message's context to the user or application program

(physical/presentation)

139>__________layer is a context sensitive layer (physical/presentation)

140>wrt presentation layer , a common syntax that is used for semantics is__________ (BER/ASN.1)

141>ASN.1 stands for__________

142>Data encryption and data compression are also generally done in __________layer (physical/presentation)

143>The _____&_____layers form the suite of TCP/IP protocols (transport/data link/network)

144>wrt SNA , arrange the following in correct sequence (top to bottom)

a: physical

b: path control

c: transmission control

d: data link

e: data flow control

f: presentation services

g: end user application

Ans:__________ (gfecabd/gfecbda/gfeabdc)

145>In SNA, the combination of _____&_____services are called the SNA transmission subsystem (transmission

control/presentation/data flow )

146>In SNA , _________services are also known as SNA high level services (data flow/transmission

control/presentation )

147>All application specific protocol services in OSI are sandwiched between the_____ and_____ layers

(user/transport/presentation)

148>In the Internet model, all application specific protocol services are sandwiched between the____&_____

layers (session/user/transport)

Page 6: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

6

149>A user interfaces with a host at a remote terminal using ____in the OSI model and ______in the Internet model

(Telnet/VT)

150>File transfers are accomplished using _____in the OSI model and _____in the Internet (FTP/FTAM)

151>FTAM stands for___________

152>The most common mail service function in the Internet is______. A similar protocol in the OSI model is_____

(MOTIS/SMTP)

153>MOTIS stands for_________

154>Network management is accomplished using ____in the OSI model and _______in the Internet (CMIP/SNMP)

155>CMIP stands for___________

156>OAM&P stands for___________

157>NMS stands for__________

158>The most common and serious problems of networks are connectivity failures, which are in the category

of__________ management (security/fault)

159>__________is generally interpreted to mean failures in accessing networks and systems by the users

(risk/fault)

160>Power hits could reset network component configuration, causing network failures (true/false)________

161>CIO stands for_________

162>The corporate network needs to be secured for privacy and content using __________

(firewalls/encryption/both)

163>____network was monopolistic and had expensive redundancy. ______network is adhoc, decentralized, has

loosely specified interfaces, and has dynamic routing (data/telephone)

164>The latest user satisfaction for an ISP is _____% (8/16/32)

165>Which elements of managing your network require most of your time?

a: configuring the management system itself

b: expanding the network

c: gathering and analyzing statistics for presentation to upper management

Ans:__________ (a/b/c/all)

166>Sniffer is an example of troubleshooting tools (true/false) __________

167>What does a network failure cost the user

a: there are tangible and intangible losses

b: the cost is a function of the dependence of the business upon shared data

c: A&R labs need high technology and tolerate low reliability. Business accept lower and proven technology but

require high reliability

Ans:__________ (a/b/c/all)

168>__________management can be defined as OAM&P of network and services (configuration/network)

169>Match the following

Operations group :involves network planning and circuit provisioning

network administration :handles functions that include both installation con repairs of facilities

and equipment

installation & maintenance group: concerned with daily operations in providing network services

Provisioning :concerned with establishing and administering the overall goals ,

policies

and procedures of network managements

170>The goal of network management is to ensure that the users of a network receive the information technology

services with the quality of service that they expect (true/false)__________

171>Network management comprises of _______major groups (2/3/4)

172>Network management comprises of following groups

a: network provisioning

b: network operations

c: network installation and maintenance

Ans:__________ (a/b/c/all)

173>_______is the primary responsibility of the engineering groups and ____is the primary responsibility of the

plant facilities group (network provisioning/network operations/network I&M)

174>The normal daily operations are the function of the __________groups, which controls and administers a

network operation center (network provisioning/network operations/network I&M)

175>NOC stands for__________

176>__________is the nerve center of network management operations (NMS/NOC)

177>The functions of the NOC are concerned primarily with _____;its secondary responsibilities are_____&_____

(network provisioning/network operations/network I&M)

178>__________consists of network planning and design and is the responsibility of the engineering group

(network provisioning/network operations/network I&M)

Page 7: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

7

179>ISO has defined __OSI network management applications (4/5/6)

180>__________are concerned with daily operations of the network and providing network services (network

provisioning/network operations/network I&M)

181>ISO has defined following OSI network management applications

a: fault management

b: configuration management

c: performance management

d: security management

e: account management

Ans:__________ (a/b/c/d/e/all)

182>Whenever there is a service failure, it is responsibility of _______to restore service as soon as possible

(NMS/NOC)

183>In several failure situations , the network will detect and restore service automatically .This network feature is

called __________ (grooming/self healing)

184>Restoration of service does not include fixing the cause of the problem. That responsibility to fix the problem

usually rests with the__________ group (network provisioning/network operations/network I&M)

185>__________administration is the administrative part of fault management and is used to track problems in the

network (session ticket/trouble ticket)

186>wrt network management , there are ______configurations of the network (3/4/5)

187>Following are the configurations of the network

a: static configuration

b: current running configuration

c: planned configuration

Ans:__________ (a/b/c/all)

188>_____configuration is one that would come up if the network is started from idle status. In_____ configuration

of the future , the configuration data will change as the network is changed (planned/current/static)

189>__________management includes physically securing the network as well as controlling access to the network

by the users (fault/security)

190>Access privilege to application software is not the responsibility of the NOC unless the application is either

owned or maintained by the NOC (true/false)__________

191>Traffic statistics are helpful in detecting trends and planning future needs (true/false)__________

192>NOC gathers data and keeps them up to date in order to tune the network for optimum performance

(true/false)__________

193>__________administers costs and allocate the use of the network (NMS/NOC)

194>Since the network consists of components manufactured by multiple vendors, commonality in the definition

and relationship of component attribute is needed. This is defined by the __________ (SMI/MIB)

195>__________is the Internet management protocol which is the most popular protocol to acquire the data

automatically using protocol and performance analyzing tools (SMTP/SNMP)

196>There______ classes of reports (3/4/5)

197>Following are different classes of reports

a: system report

b: management report

c: user report

Ans:__________ (a/b/c/all)

198>Match the following

System report :are distributed to the users on a periodic basis to let them know the status of network

performance

management report :are needed for network operations to track the activities

user report :goto the management of the network management group to keep them informed about

the activities and performance of the NOC and the networks

199>__________group takes care of all installation and maintenance of equipment and cables (network

operation/network I&M)

200>___________group is the service arm of the engineering group for installation and fixing troubles for network

operations (network operation/network I&M)

201>__________management is the management of systems and system resources in the network while_________

management is concerned with network resources such as hubs , switches , bridges , routers and gateways, and the

connectivity among them via a network (system/data/network)

202>___________management addresses end to end connectivity between any two processors in the network

(system/network)

203>A network consists of network components and their inter connections (true/false)_________

204>A network management system manages all the components that are connected to a network

(true/false)__________

Page 8: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

8

205>The two major standards are the Internet and the OSI standards (true/false)___________

206>TMN stands for___________

207>The popular _____ end systems are housed either on SUN or HP UNIX based workstations. The ______end

network management systems run either on Windows 95/98 or Windows NT (low/high)

208>Network connectivity could be tested using the ping command in UNIX (traceroute) and Windows NT

(tracert) based system (true/false)___________

209>The current network management systems are based on the ________protocol (SMTP/SNMP)

210>following are limitations of current network management systems

a: they need a dedicated NMS monitoring station, which must be on a specific type of platform

b: the values of the managed objects should be defined as scalar values

c: SNMP based management is a poling based system

Ans:___________ (a/b/c/all)

211>__________ based management protocol CMIP is object oriented (OSI/Internet)

212>Limitations in SNMP based management have been overcome by the emerging web based management

(true/false)___________

213>A web based system is platform independent for the management software using Java languase in the managed

components , for the Web based NMS server as well as for Web browser monitors (true/false)___________

214>Following are web based management schemes

a: Java based JMX developed by Sun

b: WBEM based on the Common Information Model developed by Microsoft

Ans:___________ (a/b/both)

215>JMX stands for___________

216>WBEM stands for__________

217>The broadband multimedia service is based on ATM SONET wide area network and several emerging access

technologies such as HFC and ADSL (true/false)___________

218>HFC stands for___________

219>ADSL stands for___________

220>___________network, which is the direction of the next generation network, would include embedded

network management applications (intelligent/active)

221>following methods can be used to find the root of a problem in network

a: artificial intelligence

b: algorithmic schemes

c: finite state machine

Ans:___________ (a/b/c/all)

222>_____establish secure networks , and______ ensures secure communication (cryptography/firewalls)

ANSWERS:

1>T

2>5,3

3>trunk

4>lowest

5>

6>1-c 2-e 3-d 4-a 5-b

7>loop

8>T

9>Direct Distance Dialing

10>DDD,3

11>1-c 2-b 3-a

12>either

13>switch

14>T

15>T

16>Network Operation Center

17>NOC

18>NOC

19>user

20>restoration of services, quality and economy

21>Plain Old Telephone Service

22>network

23>both

24>link

25>both

Page 9: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

9

26>end, intermediate

27>end

28>end

29>Data Terminating Equipment

30>DTO

31>either

32>analog

33>digital

34>Integrated Services Digital Network

35>digital

36>all

37>circuit

38>message & packet

39>message

40>packet

41>bridges & routers

42>packet

43>latter

44>packet

45>message

46>Public Switched Data Network

47>tele, data

48>circuit

49>T

50>modem

51> onsite communication controller

52> onsite switch PBX

53>less, less

54>Systems Network Architecture

55>both

56>cluster, communication

57>Distributed Computing Environment

58>WAN

59>bridge, router

60>both

61>client, server

62>client, client, server

63>client, server

64>T

65>T

66>peer to peer

67>TCP/IP

68>connectionless, connection oriented, connectionless

69>UDP/IP

70>T

71>gateway

72>T

73>store & forward

74>T

75>user

76>T

77>switching, gateway

78>MAC

79>all

80>gateway

81>intranet, internet

82>standards, protocols

83>architecture

84>communication

85>protocols

86>protocols

87>SMTP

Page 10: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

10

88>2

89>application, transport

90>3

91>7498

92>both

93>peer to peer

94>1to4 5to7

95>3

96>1-e 2-f 3-c 4-d 5-b 6-g 7-a

97>LLC, MAC

98>all

99>b,d

100>a,c

101>protocol data unit

102>2

103>PCI, UD

104>PCI, UD

105>lower

106>physical

107>physical

108>2

109>International Telecommunications Union-Telecommunication Sector

110>Electronics Industries Association

111>data link

112>bit

113>all

114>T

115>MAC

116>2

117>bus, ring

118>both

119>Connectionless Network Service

120>Connection Oriented Network Service

121>CLNS

122>CONS

123>CONS

124>router

125>3

126>all

127>SubNetwork Independent Convergence Protocol

128>SubNetwork Dependent Convergence Protocol

129>SubNetwork Dependent Access Protocol

130>SNICP

131>SNICP, SNDCP

132>SNDAP

133>either

134>oriented

135>all

136>5to7

137>session

138>presentation

139>presentation

140>ASN.1

141>Abstract Syntax Notation Number One

142>presentation

143>transport, network

144>gfecbda

145>transmission control, data flow

146>presentation

147>user, presentation

148>user, transport

149>VT, telnet

Page 11: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

11

150>FTAM, FTP

151>File Transfer Access & Management

152>SMTP, MOTIS

153>Message Oriented Text Interchange Standard

154>CMIP, SNMP

155>Common Management Information Protocol

156>Operations Administration Maintenance & Provisioning

157>Network Management System

158>fault

159>fault

160>T

161>Chief Information Officer

162>both

163>telephone, data

164>16

165>all

166>T

167>all

168>network

169>1-c 2-d 3-b 4-a

170>T

171>3

172>all

173>network provisioning, network I&M

174>network operation

175>Network Operations Center

176>NOC

177>network operations, network provisioning and network I&M

178>network provisioning

179>5

180>network operation

181>all

182>NOC

183>self healing

184>network I&M

185>trouble ticket

186>3

187>all

188>static, planned

189>security

190>T

191>T

192>T

193>NOC

194>MIB

195>SNMP

196>3

197>all

198>1-b 2-c 3-a

199>networkI&M

200>network I&M

201>system, network

202>network

203>T

204>T

205>T

206>Telecommunication Management System

207>high, low

208>T

209>SNMP

210>all

211>OSI

Page 12: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

12

212>T

213>T

214>both

215>Java Management Extensions

216>Web Based Enterprise Management

217>T

218>Hybrid Fiber Coax

219>Asymmetric Digital Subscriber Loop

220>active

221>all 222>firewalls, cryptography

Page 13: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

13

CHAPTER 3: BASIC FOUNDATION -- STANDARDS, MODELS

AND LANGUAGE

1>__________ model addresses the applications that fall into the categories of fault, configuration, performance,

security and accounting (information/functional)

2>Match the following

Network management :management of a system's resources such as central processor usage, disk usage

and application processes

System management :deals with services provided by organizations to customers

Service management :management of the network comprising nodes and links

3>_____management is an extension to _____&_____management (network/system/service)

4>The two leading models of network management are the Internet model and the OSI model

(true/false)__________

5>__________model is the most widely used for network management (OSI/Internet)

6>_____model is a simpler scalar model and hence easy to implement. ______model is object oriented , is more

complex and harder to implement (OSI/Internet)

7>A higher level management network called TMN is based on the ___________model (OSI/Internet)

8>TMN stands for___________

9Identify features of OSI/CMIP standard

a: International standard (ISO/OSI)

b: management of data communications networks- LAN and WAN

c: deals with all seven layers

d: object oriented and most complete

e: consumes large resource in implementation

f: well structured and layered

Ans:___________ (a/b/c/d/e/f/all)

10>Identify features of SNMP/Internet Standard

a: Industry standard (IETF)

b: easy to implement

c: most widely implemented

d: originally intended for management of Internet components, currently adopted for WAN and telecommunication

systems

Ans:___________ (a/b/c/d/all)

11>Identify features of TMN standard

a: International standard (ITU-T)

b: Management of telecommunications network

c: based on OSI network management framework

d: addresses both network and administrative aspects of management

Ans:___________ (a/b/c/d/all)

12>Identify features of IEEE standard

a: IEEE standards adopted internationally

b: addresses management of LANs and MANs

c: adopts OSI standards significantly

d: deals with first two layers of the OSI reference model

Ans:__________ (a/b/c/d/all)

13>Following are web based management standards

a: WBEM

b: JMX

Ans:___________ (a/b/both)

14>CMIP stands for___________

15>CMIS stands for___________

16>The OSI management protocol standard is ____, and has built in services, ______, that specify the basic

services needed to perform the various functions (CMIS/CMIP)

17>Both LANs and WANs can be managed using___________ (CMIS/CMIP/both)

18>Major drawbacks of the OSI management standard are

a: it is complex b: CMIP stack is large

Ans:___________ (a/b/both)

Page 14: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

14

19>In contrast to _____, ______is truly simple (SNMP/CMIP)

20>___________is responsible for all Internet specifications including network management (IEEE/IETF)

21>___________is designed to manage the telecommunications network and is oriented toward the needs of

telecommunications service providers (ITU/TMN)

22>_____is the standard of______ and is based on OSI CMIP/CMIS specifications (ITU/TMN)

23>The IEEE standards for LAN and MAN specifications are concerned only with OSI layers__&___1/2/3)

24>Both OSI/CMIP and Internet/SNMP protocols use _______standards for the lower layers (IETF/IEEE)

25>The IEEE ____.x series of specifications defines the standards for the various physical media and data link

protocols (802/803)_______

26>IEEE 802.__ specifications present overview, architecture and management. IEEE 802.__standard specifies the

LLC layer. IEEE 802.__ specifications are defined for Ethernet LANs (1/2/3/4)

27>___________layer provides transparency of the various physical media and protocols to the network layer

(MAC/LLC)

28>Web based management is based on using web technology , a web _____for the management system and web

______for network management stations (browsers/server)

29>DMTF stands for_________

30>___________is developing specifications for WBEM (IETF/DMTF)

31>___________has chosen the Microsoft object oriented management model, Common Information Model

(IETF/DMTF)

32>___________is based on a special subset of Java applets developed by Sun Microsystems that runs in the

network components (BEM/JMX)

33>TMM uses_______ (SNMP/CMIP )

34>Both SNMP and CMIP use polling methodology (true/false)___________

35>OSI network management architecture model comprise of ____models (3/4/5)

36>Following are the models of OSI network management

a: organization model

b: information model

c: communication model

d: functional model

Ans: ___________ (a/b/c/d/all)

37>In OSI model, _________model describes the components of a network management system, their functions

and their infrastructure (functional/organization/information/communication)

38>The organization model is defined in ISO______OSI systems management Overview (10400/10040/10004)

39>___________model defines the terms object, agent and manager

(functional/organization/information/communication)

40>___________model deals with the structure and organization of management information

(functional/organization/information/communication)

41>ISO=________ specifies the SMI and the information database, MIB (10156/10165)

42>SMI stands for___________

43>MIB stands for___________

44>_____describes how the management information is structured and ______deals with the relationship and

storage of management information (MIB/SMI)

45>Communication model has ___________components (2/3/4)

46>Components of communication model are

a: management application processes that function in the application layer

b: layer management between layers

c :layer operation within the layers

Ans:___________ (a/b/c/all)

47>___________model deals with the user oriented requirements of network management

(functional/organization/information/communication)

48>OSI defines ____functional application areas (4/5/6)

49>Only ____model presents the complete model for network management (Internet/OSI)_______

50>OSI deals wit all 7 networking layers (true/false)___________

51>The IETF does not define architecture for the SNMP management model explicitly (true/false)___________

52>TMN is based on the___________ model (OSI/internet)

53>______standard is dedicated to the management of layers 1 and 2 of the OSI reference model

(IEEE/IETF)_____

54>The IEEE standard is primarily concerned with the ___________model

(functional/information/organization/communication)

55>In Web based management , ___________model uses Web server - Web browser architecture

(functional/information/organization/communication)

Page 15: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

15

56>Following object oriented technologies are influencing Web based managementa:hypermedia server

b: CORBA oriented transportation

c: client/server push technology

Ans: ___________ (a/b/c/all)

57>___________model describes the components of network management and their relationships

(functional/information/organization/communication)

58>In organization model, network objects can be classified into managed and unmanaged objects

(true/false)___________

59>MDB stands for___________

60>The managed elements have a management process running in them called___________ (broker/agent)

61>_________ elements do not have a management process running in them (managed/unmanaged)

62>Managed hub is more expensive than the unmanaged hub (true/false)___________

63>_________manages the managed element (agent/manager)

64>In organization model, there is database in_____ _but not in_____ (agent/manager)

65>In _____tier configuration of organization model, the intermediate layer acts both agent and manager

(two/three)______

66>In three tier configuration of organization model, as______, intermediate layer collects data from the network

elements, processes it, and stores the results in its database. As _____, it transmits information to the top level

manager (agent/manager)

67>MoM stands for___________

68>_____refers to a system that runs a management process (NOC/NMS)

69>___________model is concerned with the structure and the storage of information

(organization/information/functional/communication)

70>The representation of objects and information relevant to their management form the management___________

model (organization/information/functional/communication)

71>___________model specifies the information base to describe managed objects and their relationships

(organization/information/functional/communication)

72>____defines the syntax and semantics of management information stored in_______ (MIB/SMI)

73>___________is used by both agent and management processes to store and exchange management information

(MIB/SMI)

74>In information model , _____MIB consists of information on all the network components that it manages ,

whereas ______MIB needs to know only its local information, its MIB view (agent/manager)

75>______is a real database whereas _____is a virtual database (MIB/MDB)

76>_____contains the measured or administratively configured value of the elements of the network. On the other

hand, ______ contains the information necessary for processes to exchange information (MIB/MDB)

77>Following types of information can be stored in the MIB

a: network elements-hubs, bridges , routers, transmission facilities

b: software processes-programs, algorithms , protocol functions , databases

c: administrative information-contact person, account number

Ans:___________ (a/b/c/all)

78>___________objects are uniquely defined by a tree structure specified by the OSI model and are used in the

Internet model (managed/unmanaged)

79>MIT stands for___________

80>In____________ model, the managed objects are defined by a containment tree that represent the MIT

(OSI/Internet)

81>In OSI MIT, there are ____nodes in the layer beneath the root (2/3/4)

82>Wrt OSI MIT, the following are the nodes in the layer beneath the root

a: iso

b: ccitt (itu)

c: iso-ccitt (iso-itu)

Ans:___________ (a/b/c/all)

83>iso stands for___________

84>itu stands for___________

85>There are_____ basic attributes of a managed object type from the Internet perspective (4/5/6)

86>Following are the basic attributes of a managed object type from the Internet perspective

a: object type (object identifier & descriptor)

b: definition

c: syntax

d: access

e: status

Ans:___________ (a/b/c/d/e/all)

Page 16: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

16

87>Specification for the Internet are defined in RFC documents (true/false)___________

88>A managed object in the Internet model is defined by _____parameters (4/5/6)

89>A managed object in the Internet model is defined by five parameters and for this RFC=____ (1551/1515/1155)

90>A managed object in the Internet model is defined by following parameters

a: object identifier and descriptor

b: syntax

c: access

d: status

e: definition

Ans:___________ (a/b/c/d/e/all)

91>Match the following

object identifier and descriptor : textual description of the semantics of object type

Syntax : implementation requirements

Access : access privilege to a managed object

Status : used to model the object

Definition : unique ID and name for the object type

92>_____ object model is a scalar model and is easy to understand. In contrast , ______perspective of a managed

object is complex and has a different set of characteristics (OSI/Internet)

93>___________specifications are object oriented and hence a managed object belongs to an object class

(OSI/Internet)

94>___________of an object defines the external perspective of the object (entity/attribute)

95>___________of the object is to change its attribute (behavior/operation)

96>An OSI managed object has the following characteristics

a: object class

b: attributes

c: operations

d: behaviour

e: notifications

Ans:___________ (a/b/c/d/e/all)

97>Operation in the Internet model is done by _____&______ commands. Notification s done by

____&_____messages (get/set/response/alarm)

98>In____ , we can create and delete objects, these concepts do not exist in _______ (OSI/Internet)

99>_____characteristics of the Internet model is part of the security function in the OSI functional model

(status/access)______

100>___________characteristics of the Internet model is handled by conformance as part of application services in

OSI (status/access)

101>Match the following

Object type :counts number of packets

Syntax :Mandatory

Access :counter

Status :read only

Description :PktCounter

102>Match the following

Object class :generates notifications on new value

Attributes :get or set

Operations :retrieves or resets values

Behavior :packet counter

Notifications :Single valued

103>Following are characteristics from Internet perspective

a: object type

b: syntax

c: access

d: status

e: description

Ans:__________ (a/b/c/d/e/all)

104>Characteristics from OSI perspective are

a: object class b: attributes

c: operations d: behaviour

e: notifications

Ans:__________ (a/b/c/d/e/all)

Page 17: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

17

105>Management data is communicated between agent and manager processes, as well as between manager

processes (true/false)__________

106>__________aspects need to be addressed in the communication of information between two entities (2/3/4)

107>Following aspects need to be addressed in the communication of information between two entities

a: transport medium of message exchange

b: message format of communication

c: actual message

Ans:__________ (a/b/c)

108>Match the following

transport protocol :actual message

application protocol :transport medium exchange

commands & responses :message format of communication

109>__________is the unsolicited messages such as alarms, generated by the agent (notification/trap/both)

110>__________model uses CMIP along with CMIS (Internet/OSI)

111>__________model uses SNMP for communication (Internet/OSI)

112>OSI uses _________protocol for transportation (connection oriented/connectionless/both)

113>Internet uses __________UDP/IP protocol to transport messages (connection oriented/connectionless/both)

114>The TP4 transport layer protocol riding on top of the x.25 protocol could be used for__________ transporting

and application messages (connection oriented/connectionless/both)

115>______&_____specifies the management communication protocols for OSI and Internet management

respectively (SNMP/CMIP)

116>__________is a formal language developed jointly by CCITT and ISO for use with application layers for data

transfer between systems (BER/ASN.1)

117>ASN.1 is at the__________ layer (presentation/session)

118>__________is defined as the set of rules used to specify data types and structures for storage of information

(transfer syntax/abstract syntax)

119>___________represents the set of rules for communicating information between systems (transfer

syntax/abstract syntax)

120>____is applicable to the information model while ______is applicable to the communication model (transfer

syntax/abstract syntax)

121>__________can be used with any presentation syntax, depending on the medium of presentation (transfer

syntax/abstract syntax)

122>__________in ASN.1 makes it independent of the lower layer protocols (transfer syntax/abstract syntax)

123>ISO____/_____ standards specify ASN.1 (8825/X.209 or 8824/X.208)

124>The algorithm to convert the textual ASN.1 syntax to machine readable code is called__________ (DER/BER)

125>BER stands for___________

126>BER is defined by ISO_________ (882/X.209 or 8824/X.208)

127>___________is based on the Backus system and uses the formal syntax language and grammar of the BNF

(BER/ASN.1)

128>BNF stands for__________

129> <name>::=<definition> in this expression, <name> denotes _____and the symbol ::= represents______

(defined as/entity/)

130> <digit>::=0|1|2 in this expression, the symbol | represents_____ (and/not/or)

131><op>::=+|-|*|/ in this expression, the definitions on the right side are called ___________

(production/primitives)

132> <SAE>::<number> | <SAE> | <SAE><op><SAE>, in this expression, the format of each line is defined

as___________ (production/assignment/either)

133><BooleanValue>:: TRUE| FALSE, in this expression, entities that are all in capital letters such as TRUE and

FALSE are called__________ (identifiers/keywords)

134>The data types are built up from primitive data types such as

a: INTEGER

b: REAL

c: NULL

d: GraphicString

Ans:__________ (a/b/c/d/all)

135>__________is one of several CharacterString type primitives (StringGraphic /GraphicStshng)

136>Match the following

Alternatives : SET & SEQUENCE

List : SET OF & SEQUENCE OF

Repetition : CHOICE

137>Above constructs are used to build __________data types (primitive/structured)

Page 18: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

18

138>__________data types are also called atomic entities (primitive/structured)

139>ASN.1 definition allows both backward and forward references as well as in-line definition

(true/false)__________

140>The constructs _____&_____are list builders (SET/SET OF/SEQUENCE/SEQUENCE OF)

141>The order in the list will be maintained if the list is built with the__________ construction (SET/SEQUENCE)

142>If the construct has been _____instead of_____, order in the list would be irrelevant (SEQUENCE OF/SET

OF)

143>{ product-based [0] NULL, basic [1] NULL } these assignments have integers in square brackets and these

are called________ (module/tags)

144>The definition of_________ is introduced in ASN.1 to uniquely identify a data type (module/tag)

145>We can group assignments that are related, this group is called__________ (subroutine/module)

146>identify correct formal definition of a module

a:<module name> DEFINITIONS ::= BEGIN

<name> :: <definition>

END

b: BEGIN ::=DEFINITIONS <module name>

<name> :: <definition>

END

c:<module name> BEGIN ::=DEFINITIONS

<name> :: <definition>

END

Ans:__________ (a/b/c)

147>Match the following

::= range

| start & end of a subtype

- start & end of a list

-- start & end of a tag

{} signed number

[] following the symbol are comments

() defined as or assignment

'' or, alternatives , options of a list signed number

148><module name> DEFINITIONS ::= BEGIN

<name> :: <definition>

END

The terms DEFINITIONS, BEGIN and END are primitives and are called __________in ASN.1

(identifier/keyword)

149>Grouping assignments into modules has following advantages

a: modules can be imported into and exported from other modules

b: modules are reusable

Ans:__________ (a/b/both)

150>Match the following

BEGIN : any negative or non-negative number

CHOICE :a sequence of non-negative numbers

DEFINITIONS :end of an ASN.1 module

END :list of alternatives

EXPORTS :start of an ASN.1 module

IDENTIFIER :definition of a data type or managed object

IMPORTS :data types that can be exported to other modules

INTEGER :data types defined in external modules

151>Match the following

NULL :used with OCTET for denoting string of octets

OBJECT :unordered list makes

OCTET :ordered list maker

OF :unbounded 8 bit bytes (octts) of binary data

SEQUENCE :a placeholder

SEQUENCE OF :used with IDENTIFIER to uniquely identify an object

SET :used with SET and SEQUENCE

SET OF :ordered array of repetitive data

STRING :unordered list of repetitive data

Page 19: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

19

152>Match the following

Object name :INTEGER, BEGIN

Application data type :RMON-MIB

Module :Counter, IpAddress

Macro, MIB module :PersonalRecord

Keywords :sysDescr, etherStatsPkts

153>Simple data type is also called_________ (primitive/atomic/basic/all)

154>___________uniquely identifies the data type irrespective of the syntax version (atomic/tag)

155>Data types are defined based on___________ (structure/tag/both)

156>wrt Object and Data types, the structure is divided into _______categories (3/4/5)

157>wrt Object and Data types , the tag is divided into___ categories (2/3/4)

158>The tag is divided into following

a: class

b: tag number

Ans:__________ (a/b/both)

159>Following are different categories of data type structure

a: simple type

b: structured type

c: tagged type

d: other type

Ans:_________ (a/b/c/d/all)

160>________type is one for which the values are specified directly (structured/tagged/simple)

161>INTEGER is a________ type (structured/tagged/simple)

162>A data type is a __________type when it contains other types (structured/tagged/simple)

163>Types that are within a structured type are called _________types (component/tagged)

164>SET is distinguished from SEQUENCE in following respects

a: data types should all be distinct

b: order of values in SET is of no consequence

Ans:__________ (a/b/both)

165>Order of values is critical in _______ (SET/SEQUENCE)

166>The component data types in the __________construct need not be distinct because the order is preserved

(SET/SEQUENCE)

167>__________type is a type derived from another type (structured/tagged)

168>__________type is a data type that is not predefined (structured/tagged/other)

169>___________type is chosen from CHOICE and ANY types, which are contained in other types

(structured/tagged/other)

170>Type__________ defines the selection of one value from specified list of distinct types (ANY/CHOICE)

171>Every data type except __________has a tag associated with it (CHOICE/ANY/both)

172>A tag has following components

a: class

b: tag number

Ans:__________ (a/b/both)

173>There are _____classes of tag (3/4/5)

174>Following are different classes of tag

a: universal

b: application

c: context specific

d: private

Ans:__________ (a/b/c/d/all)

175>__________class is the most common (application/context specific/universal/private)

176>Data types in the __________class are application independent (application/context specific/universal/private)

177>__________class is similar to the use of a global variable in a software program and is applicable anywhere in

a program (application/context specific/universal/private)

178>BOOLEAN & INTEGER are examples of __________class , whose tag numbers are [1] and [2] respectively

(application/context specific/universal/private)

Page 20: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

20

179>Match the following

Universal 1 :REAL

Universal 2 :Object description

Universal 3 :NULL

Universal 4 :BIT STRING

Universal 5 :BOOLEAN

Universal 6 :EXTERNAL

Universal 7 :OBJECT IDENTIFIER

Universal 8 :OCTET STRING

Universal 9 :INTEGER

180>Match the following

Universal 10 :TeletexString

Universal 11 :NumericString

Universal 12-15 :SEQUENCE & SEQUENCE OF

Universal 16 :ENCRYPTED

Universal 17 :ENUMERATED

Universal 18 :Reserved for future use

Universal 19 :SET & SET OF

Universal 20 :PrintableString

181>Match the following

Universal 21 :reserved for future use

Universal 22 :GeneralString

Universal 23 :GraphicString

Universal 24 :UTCTime

Universal 25 :VideotexString

Universal 26 :IASString

Universal 27 :GeneralizedTime

Universal 28 :VisibleString

Universal 29 :CharacterString

182>Tags in the __________class are specific to applications (universal/context specific/application/private)

183>_____class tag number can be overridden with _____tag number (universal/context specific/application)

184>Types in two different applications can have the same __________specific tag but each tag could carry a

different meaning in each application (context specific/application)

185>____type is a subset of_____ , is limited to that application (universal/context specific/application/private)

186>__________type is used extensively by vendors of network products (universal/context

specific/application/private)

187>In _____, there is an identifier for each occurrence of an object. In_____, it is the OBJECT IDENTIFIER

(ASN.1/MIB)

188>The ASN.1 syntax that contains the management information is encoded using the __________defined for the

transfer syntax (DER/BER)

189>TLV stands for__________

190>In TLV , the type has_____ subcomponents (3/4)

191>In TLV, the type has following subcomponents

a: class

b: P/C

c: tag number

Ans:__________ (a/b/c/all)

192>__________specifies whether the structure is a primitive or simple, type or a construct , which is anything

other than a simple type (class or P/C or

tag number)

193>__________is encoded as a one byte or an octet field (class or P/C or

tag number)

194>Match the following

Universal :1 1

Application :0 1

Context specific :0 0

Private :1 0

195>In TLV, the value of P/C is___ for primitive and ___for construct and is designated as the 6th bit (0/1)

196>In TLV, the lowest ___bits designates tag value in binary (4/5/6)

197>In TLV, class :____bits:: ___P/C: ___bits ::Tag number :___bits (1/2/3/4/5/6/7/8)

Page 21: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

21

198__________is defined as a series of octets (type/length/value)

199>In TLV, the length specifies the length of the value field in number of__________ (bits/octets)

200>In TLV, the integer value is encoded using ______complement form (ones/twos)

201>Wrt TLV , for positive value , the actual value is the binary representation, with the MSB always being___ to

indicate the positive sign (0/1)

202>wrt TLV, -5 becomes ___________in twos complement form (11110111/111111101/11111011)

203>Wrt Macros , ____defines the syntax of the new types and _____defines the syntax of the new values (TYPE

NOTATION/VALUE NOTATION)

204>________model component of the OSI model addresses the user oriented applications

(communication/functional)

205>Functional model consists of ______submodels (4/5/6)

206>Functional model has following submodels

a: configuration management

b: fault management

c: performance management

d: security management

e: accounting management

Ans:___________ (a/b/c/d/e/all)

207>___________management addresses the setting and changing of configurations of networks and their

components (performance/accounting/configuration)

208>Relevant management information is embedded in managed objects such as switches, hubs, bridges and

routers .___________management involves setting up these parameters (performance/accounting/configuration)

209>___________displays in real time the configuration of the network and its status (NOC/NMS)

210>___________management involves detection and isolation of the problem causing the failure in the network

(performance/accounting/configuration/fault)

211>In several failure situations, the network could restore service automatically. This network feature is called

___________ (grooming/self healing)

212>___________ticket administration of fault management tracks all problems in the network including

nonproblems, until they are resolved (service/trouble)

213>___________management is concerned with the performance behavior of the network

(performance/accounting/configuration)

214>___________management involves physically securing the network, access to the network resources and

secured communication over the network (performance/accounting/configuration/security)

215>___________protect corporate networks and network resources from being accessed by unauthorized

personnel and programs, including virus programs (cryptography/firewalls)

216>__________management administers costs of the network (performance/accounting/configuration)

217>___________management is directed toward service providers, in order for them to provide customer

satisfaction and to ensure the profitability of business (performance/accounting/configuration/service &business)

218>Traffic data gathered by_____ management serves as input to _____management

(performance/accounting/configuration)

219>The traffic statistics, trouble ticket administration data and accounting management results are inputs to

___________management (performance/configuration/service & business)

220>Following are network management models

a: OSI

b: Internet

c: TMN

d: IEEE 801

e: Web technology

Ans:___________ (a/b/c/d/e/all)

221>The OSI management model categorizes the____ functions of network management into____ models (3/4/5)

222>The OSI has following network management models

a: organization

b: information

c: communication

d: application

Ans:__________ (a/b/c/d/all)

223>The organization model describes the management process in the network element called the

___________process, and the management process in the ___________ (manger/agent)

224>___________model addresses the structure of management information that enables processes running in

different components in the network to exchange management data (organization/information/communication)

225>The two primary communication protocols are_____ in OSI and ______in the Internet (SNMP/CMIP)

226>The application functions are divided into___ categories of management (3/4/5)

Page 22: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

22

227>The application functions are divided into following categories of management

a: configuration

b: fault

c: performance

d: security

e: accounting

Ans:___________ (a/b/c/d/e/all)

ANSWERS 1>functional

2>1-c 2-a 3-b

3>service, system, network

4>T

5>Internet

6>Internet, OSI

7>OSI

8>Telecommunication Management Network

9>all

10>all

11>all

12>all

13>both

14>Common Management Information Protocol

15>Common Management Information Service

16>CMIP, CMIS

17>both

18>both

19>CMIP, SNMP

20>IETF (Internet Engineering Task Force)

21>TMN

22>TMN, ITU

23>1,2

24>IEEE

25>802

26>1,2,3

27>LLC

28>browser

29>Desktop Management Task Force

30>DMTF

31>DMTF

32>JMX

33>CMIP

34>T

35>4

36>all

37>organization

38>10040

39>organization

40>information

41>10165

42>Structure of Management Information

43>Management Information Base

44>SMI,MIB

45>3

46>all

47>functional

48>5

49>OSI

50>T

51>T

52>OSI

53>IEEE

Page 23: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

23

54>communication

55>organization

56>all

57>organization

58>T

59>Management Database

60>agent

61>unmanaged

62>T

63>manager

64>manager, agent

65>3

66>manager, agent

67>Manager of Managers

68>NMS

69>information

70>information

71>information

72>SMI, MIB

73>MIB

74>manager, agent

75>MDB,MIB

76>MDB,MIB

77>all

78>managed

79>Management Information Tree

80>OSI

81>3

82>all

83>International Standards Organization

84>International Telecommunications Union

85>5

86>all

87>T

88>5

89>1155

90>all

91>1-e 2-d 3-c 4-b 5-a

92>Internet, OSI

93>OSI

94>attribute

95>behavior

96>all

97>get&set, response&alarm

98>OSI, Internet

99>access

100>status

101>1-e 2-c 3-d 4-b 5-a

102>1-d 2-e 3-b 4-c 5-a

103>all

104>all

105>T

106>3

107>all

108>1-b 2-c 3-a

109>both

110>OSI

111>Internet

112>both

113>connectionless

114>connection oriented

115>CMIP,SNMP

Page 24: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

24

116>ASN.1

117>presentation

118>abstract syntax

119>transfer syntax

120>abstract syntax, transfer syntax

121>abstract syntax

122>abstract syntax

123>8824/X.208

124>BER

125>Basic Encoding Rules

126>8825/X.209

127>ASN.1

128>Backus Nauer Form

129>entity, defined as

130>or

131>primitives

132>either

133>keywords

134>all

135>GraphicString

136>1-c 2-a 3-b

137>structured

138>primitive

139>T

140>SET & SEQUENCE

141>SEQUENCE

142>SET OF,SEQUENCE OF

143>tags

144>tag

145>module

146>a

147>1-g 2-h 3-e 4-f 5-c 6-d 7-b 8-a

148>keywords

149>both

150>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a

151>1-e 2-f 3-d 4-g 5-c 6-h 7-b 8-i 9-a

152>1-e 2-c 3-d 4-b 5-a

153>all

154>tag

155>both

156>4

157>2

158>both

159>all

160>simple

161>simple

162>structured

163>component

164>both

165>SEQUENCE

166>SEQUENCE

167>tagged

168>other

169>other

170>CHOICE

171>both

172>both

173>4

174>all

175>universal

176>universal

177>universal

Page 25: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

25

178>universal

179>1-e 2-i 3-d 4-h 5-c 6-g 7-b 8-f 9-a

180>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a

181>1-e 2-f 3-d 4-g 5-c 6-h 7-b 8-i 9-a

182>application

183>universal, application

184>application

185>context specific, application

186>private

187>MIB,ASN.1

188>BER

189>Type Length Value

190>3

191>all

192>P/C

193>P/C

194>1-c 2-b 3-d 4-a

195>0,1

196>5

197>7-8, 6, 1-5

198>length

199>octets

200>twos

201>0

202>11111011('.' 00000101 11111010+1=11111011)

203>TYPE NOTATION,VALUE NOTATION

204>functional

205>5

206>all

207>configuration

208>configuration

209>NMS

210>fault

211>self healing

212>trouble

213>performance

214>security

215>firewalls

216>accounting

217>service& business

218>performance, accounting

219>service& business

220>all

221>4

222>all

223>agent, manager

224>information

225>CMIP.SNMP

226>5

227>all

Page 26: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

26

CHAPTER 4:SNMPv1 NETWORK MANAGEMENT—

ORGANIZATION & INFORMATION MODELS

1>__________management is also referred to as Internet management (SMTP/SNMP)

2>SNMP network management systems can manage even non-TCP/IP network elements through proxy agents

(true/false)__________

3>SNMP management is the most widely used __________ (NMS/NOC)

4>__________comprises management process, agent process and network elements (NMS/NOC)

5>The SNMP information model consist of

__________ (MIB/SMI/both)

6>___________uses ASN.1 syntax to define managed objects (MIB/SMI)

7>___________defines the relationship between managed objects and groups of related objects into MIB modules

(MIB/SMI)

8>MIB2 is a superset of MIB1 and is used in SNMPv__ (1/2)

9>The SNMP architecture, administration and access policies fall under___________ model

(organization/communication)

10>ICMP was developed to manage___________ (ARPANET/INTERNET)

11>___________is a mechanism to transfer control messages between nodes (PING/ICMP)

12>PING stands for__________

13>A popular example of ICMP is___________ (RING/PING)

14>___________i a simple tool used to investigate the heath of a node and the robustness of communication with it

from the source node (PING/ICMP)

15>IAB stands for___________

16>__________was formed to administer Internet activities (ICB/IAB)

17>SGMP stands for___________

18>___________is used to monitor and configure gateways remotely (SNMP/SGMP)

19>_____is an enhancement of______ (SNMP/SGMP)

20>SNMPv__ was developed to make it independent of the OSI standard (1/2/3)

21>IAB was charged with the responsibility to manage following task forces

a: IEEE

b: IETF

c: IRTF

Ans:___________ (a/b/c/all)

22>___________is an organization that maintains several archives of documents related to the Internet and the

IETF's activities (IntraNIC/InterNIC)

23>InterNIC stands for___________

24>STD stands for___________

25>FYI stands for___________

26>IANA stands for___________

27>___________is the central coordinator for the assignment of unique parameter values for Internet protocols

(IETF/IANA)

28>___________RFC subseries was created by to document overviews and topics that are introductory (STD/FYI)

29>___________RFC subseries was created to identify those RFCs that do in fact specify Internet standards

(STD/FYI)

30>There are ___ series of RFC and STD documents (3/4/5)

31>Following are the series of RFC and STD documents

___________ (SMI/MIB/SNMP/all)

32>RFC=____defines the SNMP protocol. RFC=____is on protocol operations. RFC=___ is on transport mappings

(1905/1905/1157)

33>SMI form the contents of RFC=___________ (1155/1156/1157)

34>RFC=____/STD=_____ is currently in use for MIB (1213/1217/13/17)

35>RFC=______is a draft version of MIB2 for SNMPv2 (1155/1907)_____

36>The infrastructure of the manager agent and the SNMP architecture that it is based form ___________model

(information/organization/functional)

37>wrt SNMP, definition of syntax and semantics form the basis of the ___________model

(information/organization/functional)

38>The two tier organization model consists of_____ process which resides in the managed object and______

process which resides in the NMS and manages the managed object (network manager/network agent)

Page 27: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

27

39>In two tier organization model, multiple managers can interact with one agent (true/false)___________

40>RMON stands for___________

41>In three tier organization model, _________is inserted between the managed object and the network manager

(RMAN/RMON)

42>The pure SNMP management system consists of ___________ (SNMP agent/SNMP manager/both)

43>HFC stands for___________

44>An SNMP management system can behave as an agent as well as a manager (true/false)___________

45>___________model is concerned only with the TCP/IP suite of protocols and does not address the layers above

or below it (OSI/Internet)

46>SNMP interfaces to the TCP/IP with ________are the transport layer protocol (TCP/UDP)

47>RFC=____ describes SNMP system architecture (1156/1157/1158)_

48>RFC=_____ defines SNMP by which management information for a network element may be inspected or

altered by logically remote users (1156/1157/1158)

49>RFC=____describes the structure and identification of management information, and RFC=_______addresses

the information base that is required for management (1154/1155/1156/1157)

50>The communication of management information among management entities is realized through exchange

of___ protocol messages (4/5/6)

51>The communication of management information among management entities is realized through exchange of

following protocol messages

a: get-request

b: get-next-request

c: set-request

d: get-response

e: trap

Ans:___________ (a/b/c/d/e/all)

52>Following protocol messages are initiated by the manager application process

a: get-request

b: get-next-request

c: set-request

d: get-response

e: trap

Ans:___________ (a/b/c/d/e)

53>Following messages are generated by the agent process

a: get-request

b: get-next-request

c: set-request

d: get-response

e: trap

Ans:___________ (a/b/c/d/e)

54>The message generation is called___________

55>__________is unsolicited alarm message (get-response/trap)

56>___________message is generated by the management process requesting the value of an object (get-

request/get-next-request/set-request/get-response/trap)

57>An object may have multiple values because of multiple instances of the object, in this case, _________

message can be used (get-request/get-next-request)

58>___________message is generated by the management process to initiate or reset the value of an object variable

(get-request/get-next-request/set-request/get-response/trap)

59>___________message is generated by an agent process (get-request/get-next-request/set-request/get-

response/trap)

60>___________is an unsolicited message generated by an agent process w/o a message or event arriving from the

manager process (get-request/get-next-request/set-request/get-response/trap)

61>SNMP manager contains following sets of data

a: one on the information about the objects

b: one on the values of the objects

Ans:___________ (a/b/both)

62>In q61, b is ______ (static/dynamic) and contains the measured values associated with the object_____

(true/virtual) database

.63>A MIB is _____ (true/virtual) database and is_________ (static/dynamic)

64>SNMP _____has a database which is the physical database and the SNMP ______does not have a physical

database (agent/manager)

65>_________have MIB which is compiled into the software module (agent/manager)

66>___________model deals with SMI and MIB (organization/functional/information)

Page 28: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

28

67>The syntax used to describe management information is ASN._ (0/1/2)

68>The specification and organizational aspects of managed objects are addressed in______ (MIB/SMI)

69>The specifications of managed objects and the grouping of. And relationship between, managed objects are

addressed in ________ (MIB/SMI)

70>RFC=___ for SMI. RFC=____ for MIB (1213/1312/1157/1157)

71>Match the following

FDDI :RFC 1695

OSPF :RFC 1285

ATM :RFC 1253

72>A managed object is composed of___________ (object type/object instance/both)

73>SMI is concerned only with_____ and not______ (object type/object instance)

74>___________is a data type , has a name, syntax , and an encoding scheme (object type/object instance)

75>The syntax of an object type is defined using ____and _____have been adopted as the encoding scheme for

transfer of data types between agent and manager processes , as well as between manager processes (BER/ASN.1)

76>Every object type (every name) is uniquely identified by___________ (DESCRIPTOR/OBJECT IDENTIFIER)

77>DESCRIPTOR and OBJECT IDENTIFIER are in uppercase letters because they are___________ keywords

(BER/ASN.1)

78>There are____ objects under the internet object (3/4/5)_______

79>Following are the subnodes under Internet node in SNMPv1

a: directory

b: mgmt

c: experimental

d: private

Ans:___________ (a/b/c/d/all)

80>____________node is reserved for future use of OSI directory in the Internet

(directory/mgmt/experimental/private)

81>___________node is used to identify all IETF recommended and IAB approved subnodes and objects

(directory/mgmt/experimental/private)

82>___________node was created to define objects under IETF experiments (directory/mgmt/experimental/private)

83>___________is a heavily used node (directory/mgmt/experimental/private)

84>___________syntax is used to define the structure of object types (BER/ASN.1)

85>in ASN.1 data type, there are___ categories under structure (3/4/5)________

86>in ASN.1 data type, there are following categories under structure

a: simple

b: defined

c: constructor

Ans:___________ (a/b/c/all)

87>Simple, defined and constructor types are also called___ ____&____respectively

(application/structured/primitive)

88>SEQUENCE & SEQUENCE OF are not called base types (true/false)___________

89>The primitive or simple types are atomic and are INTEGER, OCTET STRING, OBJECT IDENTIFIER &

NULL. These are also referred to as ___________types (aggregate/non-ggregate)

90>When the integer value is restricted by a range it is called___________ (signed/ subtype)

91>The data type ENUMERATED is a special case of the ______data type (REAL/INTEGER)

92>Following are data types under Primitive types

a: INTEGER

b: OCTET STRING

c: OBJECT IDENTIFIER

d: NULL

Ans:___________ (a/b/c/d/all)

93>Following are data types under defined types

a: NetworkAddress b: IpAddress

c: Counter d: Gauge

e: TimeTicks f: Opaque

Ans:___________ (a/b/c/d/e/f/all)

94>Following are data types under constructor types

a: SEQUENCE

b: SEQUENCE OF

Ans:___________ (a/b/both)

95>Match the following

INTEGER :placeholder

Page 29: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

29

OCTET STRING :object position in MIB

OBJECT IDENTIFIER :8bit bytes binary and textual data

NULL :subtypes INTEGER (n1. . . .nN)

96>Match the following

NetworkAddress :application wide arbitrary ASN.1 syntax, double wrapped OCTET STRING

IpAddress :non-negative integer in hundredth of second units

Counter :capped, on-negative integer, increase or decrease

Gauge :wraparound, non-negative integer, monotonically increasing, may 2^32-1

TimeTicks :dotted decimal IP address

Opaque :Not used

97>____:List maker::______: Table maker (SEQUENCE/SEQUENCE OF)

98>___________data type is used to specify either binary or textual information that is 8 bits long (OCTET

IDENTIFIER/OCTET STRING)

99>The combination keyword __________is the object position in the MIB (OBJECT STRING/OBJECT

IDENTIFIER)

100>___________are application specific data types and are SNMP based types (primitive/defined)

101>The base type ________is used to specify octets of binary information (Gauge/Opaque)

102>__________is intended for adding new base types to extend SNMP SMI (Gauge/Opaque)

103>__________is a choice of the address of the protocol family (IpAddress/NetworkAddress)

104>__________is the conventional four groups of dotted decimal notation of IPv4 (IpAddress/NetworkAddress)

105>__________is an application wide data type and is a non-negative integer (TimeTicks/Gauge/Counter)

106>Counter can only increase in value up to a maximum of 2^__-1 and then wraps around starting from 0

(16/32/64)

107>The data type __________is a non-negative integer , but its value can move either up or down

(Counter/Gauge/TimeTicks)

108>Gauge pegs at its maximum value of 2^__-1 (16/32/64)________

109>__________is a non-negative integer and measures time in units of hundredth of a second

(Counter/Gauge/TimeTicks)

110>The maximum value of TimeTicks is 2^__-1 (16/32/64)

111>__________is an application wide data types that supports the capability to pass arbitrary ASN.1 syntax

(Gauge/Opaque)

112>__________is used to create data types based on previously defined data types (Gauge/Opaque)

113>Size of ________is undefined in SNMPv1, which causes some problem in its implementation (Gauge/Counter/

Opaque)

114>The Opaque data type can be defined both IMPLICITly and EXPLICITly (true/false)__________

115>The constructs ______&____which are in ASN.1, are not included in SNMP based management syntax

(SEQUENCE/SEQUENCE OF/SET/SET OF)

116>____is used to build a list and______ is used to build a table (SEQUENCE/SET/SEQUENCE OF/SET OF)

117>Identify syntax for list

a: SEQUENCE OF <entry>

b: SEQUENCE {<type1>, <type2>. . . . <typeN>}

Ans:__________ (a/b/either)

118>Identify syntax for table

a: SEQUENCE OF <entry>

b: SEQUENCE {<type1>, <type2>. . . . <typeN>}

Ans:__________ (a/b/either)

119>Identify SNMPv1 keywords

a: ACCESS b: BEGIN

c: CHOICE d: Counter

e: DEFINITIONS f: DEFVAL

Ans:___________ (a/b/c/d/e/f/all)

120>Identify SNMPv1 keywords

a: DESCRIPTION b: END

c: ENTERPRISE d: FROM

e: Gauge f: IDENTIFIER

Ans:___________ (a/b/c/d/e/f/all)

121>Identify SNMPv1 keywords

a: IMPORTS b: INDEX c: INTEGER

d: IpAddress `e: NetworkAddress f: OBJECT

Ans:___________ (a/b/c/d/e/f/all)

Page 30: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

30

122>Identify SNMPv1 keywords

a: OBJECT-TYPE

b: OCTET

c: OF

d: Opaque

e: REFERENCE

f: SEQUENCE

Ans:___________ (a/b/c/d/e/f/all)__________

123>Identify SNMPv1 keywords

a: SIZE

b: STATUS

c: STRING

d: SYNTAX

e: TRAP-TYPE

f: VARIABLES

g: TimeTicks

Ans:___________ (a/b/c/d/e/f/g/all)__________124>SNMPv1 has adopted ____with its____for encoding the

information to be transmitted between agent and manager processes (TLV/ASN.1/BER)___

125>Match the following

ipAdEntAddr :SEQUENCE

ipAdEntIfIndex :INTEGER

ipAdEntNetMask :IpAddress

ipAdEntReasmMaxSize:

ipAdEntBcastAddr:

ipAdEntry

126>Wrt OBJECT IDENTIFIER, if the most significant bit (8th bit) is set to___ , then the subidentifier is only one

octet long. The 8th bit is set to ___for the value that requires more than one octet and indicates more octets to

follow (0/1)___

127>_____ is encoded as straight octet strings._____ _____ & _____ coded as integers._____Is coded as OCTET

STRING type (IP address/opaque/counter/gauge/TimeTicks)

128>Match the following

OBJECT IDENTIFIER :APPLICATION 1

SEQUENCE :APPLICATION 3

IpAddress :APPLICATION 2

Counter :APPLICATION 4

Gauge :APPLICATION 0

TimeTicks :UNIVERSAL 6

Opaque :UNIVERSAL 16

129>A managed object has ____parameters (3/4/5)

130>A managed object has following parameters

a: textual name b: syntax

c: definition d: access

e: status

Ans:_________ (a/b/c/d/e/all)

131>OBJECT DESCRIPTOR does not specify instances of a managed object (true/false)___________

132>Associated with each _____is ______, which is the unique position it occupies in the MIB (OBJECT

IDENTIFIER/OBJECT DESCRIPTOR)

133>__________is the ASN.1 definition of the object type (definition/access/status/syntax)

134>__________is an accepted textual description of the object type (definition/access/status/syntax)

135>__________is the specification for the type of privilege associated with accessing the information

(definition/access/status/syntax)

136>Access is the specification for the type of privilege associated with accessing the information, it can be

__________ (read only/read write/not accessible/either of them)

137>__________specifies whether the managed object is current or obsolete (definition/access/status/syntax)

138>Related objects can be grouped to form ______ object type and the objects that make up the aggregate object

type are called ____object type component/subordinate /aggregate)

139>In order to encode the information on a managed object to be processed by machines , it has to be defined in a

formalized manner. This is done using__________ (micro/macro)

140>The body of the macro module consists of __________parts (3/4/5)

141>The body of the macro module consists of following parts

a: type notation

Page 31: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

31

b: value notation

c: supporting productions

Ans:__________ (a/b/c/all)

142>____NOTATION defines the object types in the module and ______NOTATION defines the name of the

object (TYPE/VALUE)

143>Access can be only one of following options

a: read only

b: read write

c: write only

d: not accessible

Ans:__________ (a/b/c/d/all)

144>Allowed values for Status are

a: mandatory

b: optional

c: obsolete

Ans:__________ (a/b/c/all)

145>__________object is a group of related objects (compound/aggregate)

146>Object ___ is the managed object ipAddrEntry consist of the subordinate object types of___ through ___

(1/2/5)

147>ipAddrEntry describes the complete set of information consisting of the__ fields needed for an entry in the IP

interface address table (4/5/6)

148>The text following ___are comments and are not encoded (** / --)

149>The __________clause uniquely identifies the instantiation of the entry object type in the table

(REFERENCE/INDEX)

150>The__________ clause is the textual reference to the document from which the object is being mapped

(REFERENCE/INDEX)

151>_____clause is the columnar object identifier while______ clause is the default value to be object

(REFERENCE/INDEX/DEVAL)

152>SNMP operations apply exclusively to scalar operations (true/false)___________

153>_________object type comprises one or more subtypes (compound/aggregate)

154>RFC=____ for SMI (1551/1515/1155)_______

155>RFC=____ for MIB2 (1312/1213)_______

156>MIB is a_______ information store (true/virtual)

157>Objects in the MIB are defined using ASN.1 (true/false)__________

158>__________defines the mechanism for describing the objects (MIB/SMI)

159>The definition of MIB consists of___ components (3/4/5)

160>The definition of MIB consists of following components

a: name

b: syntax

c: encoding

Ans:________ (a/b/c/all)

161>The term __________mandates the implementation of the object in the current version of MIB2

(decrypted/deprecated)

162>Objects that are related are grouped into _____while object types are grouped to form_____ (aggregate object

type/object group)

163>The MIB module structure consists of

a: module name

b: imports from other modules

c: definitions of the current module

Ans:__________ (a/b/c/all)

164>Identify correct MIB module structure

a: <module name> DEFINITIONS::=BEGIN

<imports>

<definitions>

END

b: <module name> BEGIN::=DEFINITIONS

<imports>

<definitions>

END

Ans:__________ (a/b/either)

165>__________group contains the objects that describe system administration (System/Interface/Address

Translation)

Page 32: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

32

166>__________group defines the interfaces of the network component and the network parameters associated

with each interface (System/Interface/Address Translation)

167>__________group is a cross reference table between the IP address and the physical address

(System/Interface/Address Translation)

168>__________group is a placeholder for future use of the OSI protocol (Transmission/CMOT)

169>___________group was created as a placeholder for network transmission related parameters

(Transmission/CMOT)

170>__________group is the communication protocol group associated with SNMP management (SMT/SNMP)

171>__________group is a placeholder and is not yet defined (Transmission/CMOT)

172>__________group is based on the transmission media that underlie each interface of the system

(transfer/transmission)

173>Match the following

System :mib2 11

Interfaces :mib2 9

at :mib2 7

ip :mib2 5

icmp :mib2 3

Tcp : mib2 1

Udp :mib2 2

egp :mib2 4

cmot :mib2 6

Transmission :mib2 8

Snmp :mib2 10

174>__________group is the basic group in the Internet standard MIB (at/snmp/System)

175>Implementation of the System group is mandatory for all systems in both agent and manager

(true/false)__________

176>The System group consists of___ entities (5/6/7)

177>The System group consists of following entities

a: sysDescr

b: sysObjectId

c: sysUpTime

d: sysContact

e: sysName

f: sysLocation

g: sysServices

Ans:__________ (a/b/c/d/e/f/g/all)

178>_________group contains managed objects associated with the interfaces of a system (System/Interface/snmp)

179>Implementation of the Interfaces group is mandatory for all systems (true/false)__________

180>The Interface group consists of following nodes__________ (ifNumber/ifTable/both)

181>wrt Interface group, the number of interfaces of the entity is defined by ____and the information related to

each interface is defined in the Interface table______ (ifIndex/ifTable/ifNumber)

182>Match the following

sysDescr : system 7

sysObjectId :system 5

sysUpTime :system 3

sysContact :system 1

sysName :system 2

sysLocation :system 4

sysServices :system 6

183>Match the following

ifNumber :largest size of the datagram for the interface

ifTable :type of interface layer below the network layer defined as an enumerated integer

ifEntry :total number of network interfaces in the system

ifDescr :list of entries that describes information on each interface of the system

ifType :an interface entry that contains objects at the subnetwork layer for a particular interface

ifMtu :a unique integer value for each interface

184>Match the following

ifSpeed :value of sysUpTime at the current operational status

ifPhysAddress :current operational status of the interface

ifAdminStatus :current or nominal data rate for the interface in bps

Page 33: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

33

ifOperStatus :interface's address at the protocol layer immediately below the network layer

ifLastCange :reference to MIB definitions specific to the particular media used to realize the interface

ifSpecific :desired status of the interface ie up, down or testing

185>Match the following

ifInOctets :number of unsupported protocol packets discarded

ifInUcastPkts :number of inbound packets discarded

ifInNUcastPkts :number of subnetwork unicast packets delivered to a higher layer protocol

ifInDiscards :total number of input octets received

ifInErrors :number of non-unicast packets delivered to a higher layer protocol

ifInUnknownProtos :number of inbound packets with errors

186>Match the following

ifOutOctets :length of the output queue in packets

ifOutUcastPkts :number of outbound packets discarded

ifOutNUcastPkts :total number of unicast packets that higher level layer requested to be transmitted

ifOutDiscrds :number of octets transmitted out of the interface

ifOutErrors :total number of non-unicast packets that higher level layer requested to be transmitted

ifOutQLen :number of outbound packets tat could not be transmitted because of errors

187>__________is defined are an Enumerated INTEGER (ifNumber/ifType)

188>In interface group, object identifiers 11 through 15 refer to the measurements on_____ traffic and object

identifiers 16 through 21 to measurement on_____ traffic (outbound/inbound)

189>The Address Translation group consists of table that converts _____to _____for all the interfaces of the system

(physical address/NetworkAddress)

190>The Internet uses __as the networking protocol (TCP/IP)________

191>__________group has the information on the various parameters of the protocol (system/ip/at)

192>The implementation of IP group is mandatory (true/false) __________

193>The IP group contains following tables

a:IP address table

b:IP routing table

c:IP address translation table

Ans:__________ (a/b/c/all)

194>__________indicate whether the node is acting as just as route or gateway between two autonomous networks

(ipForwDatagrams/ipForwarding)

195>Match the following

ipForwarding :number of input datagrams discarded due to unsupported

protocolipDefaultTTL :number of input datagrams discarded due to header error

ipInRecieves :number of datagrams discarded due to address errors

ipInHdrErrors :number of input datagrams attempted to forward to the destination

ipInAddrError :number of locally addressed datagrams received successfully but discarded due to

unsupported protocol

ipForwDatagrams :total number of input datagrams received from interfaces including those in error

ipInUnknownProtos :node acting as a gateway or not

ipInDiscards :time-to-live field of IP header

196>Match the following

ipInDelivers :number of failures detected by the IP reassembly algorithm

ipOutRequests :number of successfully reassembled datagrams

ipOutDiscards :number of IP datagrams received that need reassembly

ipOutNoRoutes :maximum number of seconds that received fragments are held while they are awaiting

reassembly

ipReasmReqds :number of IP datagrams discarded because no route could be found to transmit than to

their destinations

ipReasmOKs :number of no error IP datagram discarded due to lack of buffer space

ipReasmFails :total number of IP datagrams which local IP user protocols supplied to IP

ipReasmTimeOut :total number of input datagrams successfully delivered to IP user protocols

197>Match the following

ipFragOKs :number of routing entries discarded even though they were valid

ipFragFails :IP address translation table that maps IP addresses to physical address

ipFragCreates :IP routing table containing an entry for each route

ipAddrTable :Number of datagram fragments generated as a result of fragmentation

ipNetToMediaTable :number of IP datagrams not fragmented due to Don’t fragment flag set

ipRoutingDiscards :number of successfully fragmented datagrams

Page 34: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

34

ipRouteTable :table of IP addresses

198>An entry_____ in ipRouteDest Is considered a default route (1.1.1.1/0.0.0.0)

199>Match the following

ipAddrTable :broadcast address indicator bit

ipAddrEntry :index value of the entry

ipAdEntAddr :one of the entries in the IP address table

ipAdEntIfIndex :table of IP addresses

ipAdEntNetMask :the IP address to which this entry's addressing information pertains

ipAdEntBcastAddr :subnet mask for the IP address of the entry

ipAdEntReasmMaxSize :largest IP datagram that can be reassembled on this interface

200>Match the following

ipRouteTable :reference to MIB definition specific to the routing protocol

ipRouteEntry :mask to be logically ANDed with the destination address before comparing with the

ipRouteDest field

ipRouteDest :Routing mechanism by which this route was learned

ipRouteIfIndex :IP address of the next hop

ipRouteMetric1 :primary routing metric for this route

ipRouteNextHop :number of seconds since routing was last updated

ipRouteType :type of route

ipRouteProto :IP routing table

ipRouteAge :route to a particular destination

ipRouteMask :destination IP address of this route

ipRouteInfo :index of interface

ipRouteMetric2 :an alternative metric for this route

201>Match the following

ipNetToMediaTable :type of mapping

ipNetToMediaEntry :IP address

ipNetToMediaIfIndex :media dependent physical address

ipNetToMediaPhysAddress :table mapping IP addresses to physical addresses

ipNetToMediaNetAddress :IP address to physical address for the particular interface

ipNetToMediaType :Interface on which this entry's equivalence is effective

202>Match the following

ipForward :address of next system

ipForwardNumber :mask to be logically ANDed with the destination address before comparing with the

ipRouteDest field

ipForwardTable :a particular route to a particular destination under a particular policy

ipForwardEntry :number of entries in the IP forward table

ipForwardDest :contains information on IP forwarding table, deprecator IP routing table

ipForwardMask :routing table of this entity

ipForwardPolicy :destination IP route of this address

ipForwardNextHop :set of conditions that selects one multipath route

203>Match the following

ipForwardIfIndex :an alterntive routing metric for this route

ipForwardType :primary routing metric for this route

ipForwardProto :autonomus system number of next hop

ipForwardInfo :reference to MIB definition specific to the routing protocol

ipForwardNextHopAS :number of seconds since routing was last updated

ipForwardMetric1 :routing mechanism by which this route was learned

ipForwardMetric2 :type of route--remote, local, invalid or otherwise

ipForwardAge :ifIndex value of the interface

204>The entity__________defines the general set of conditions that would cause the selection of one multipath

route over others (ipForwardProto/ipForwardPolicy)

205>___________is a precursor of SNMP and is part of the TCP/IP suite (IGMP/ICMP)

206>Match the following

icmpInMsgs :number of ICMP echo reply message received

icmpInErrors :number of ICMP echo message received

icmpInDestUnreachs :number of ICMPredirect messages received

icmpInTimeExcds :number of ICMP source quench messages received

icmpInParmProbs :number of ICMP parameter problem messages received

Page 35: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

35

icmpInSrcQuenches :number of ICMP time exceeded messages received

icmpInRedirects :number of ICMP destination unreachable messages received

icmpInEchoe :total number of ICMP messages received by the entity including icmpInErrors

icmpInEchoReps :number of message received by the entity with ICMP specific errors

207>Match the following

icmpInTimestamps :number of ICMP parameter problem messages sent

icmpInTimestampReps :number of ICMP Time exceeded messages sent

icmpInAddrMasks :number of ICMP destination unreachable messages sent

icmpInAddrMasksReps :number of ICMP timestamp message received

icmpOutMsgs :number of ICMP reply messages received

icmpOutErrors :number of ICMP address mask request messages received

icmpOutDestUnreachs :number of ICMP address mask reply messages received

icmpOutTimeExcds :total number of ICMP messages attempted to be sent by this entity

icmpOutParmProbs :number of good ICMP messages not sent, does not include the ones with errors

208>Match the following

icmpOutSrcQuechs :number of ICMP address mask reply messages sent

icmpOutRedirects :number of ICMP address mask request messages sent

icmpOutEchos :number of ICMP timestamp reply messages sent

icmpOutEchoReps :number of ICMP timestamp message sent

icmpOutTimestamp :number of ICMP echo reply messages sent

icmpOutTimestampReps :number of ICMP echo messages sent

icmpOutAddrMasks :number of ICMP redirect messages sent

icmpOutAddrMasksReps :number of ICMP source quench messages sent

209>In TCP group, the table entry has following indices to uniquely define it in the table

a:tcpConnLocalAddress

b:tcpConnLocalPort

c:tcpConnRemAddress

d:tcpConnRemPort

Ans:___________ (a/b/c/d/all)

210>Match the following

tcpRtoAlgorithm :number of resets done to either CLOSED or LISTEN

tcpRtoMin :number of failed attempts to make connection

tcpRtoMax :number of passive connections made LISTEN to SYN-RCVD state

tcpMaxConn :number of active connections made CLOSED TO SYN-SENT state

tcpActiveConn :Maximum number of TCP connections

tcpPassiveOpens :maximum value for timeout in milliseconds retransmission

tcpAttemptsFails :minimum value for timeout in milliseconds for retransmission

tcpEstabResets :timeout algorithm for retransmission of octets

211>Match the following

tcpCurrEstab :number of segment send containing RST flag

tcpInSegs :Total number of segments received in error

tcpOutSegs :Total number of segments retransmitted

tcpRetransSegs :TCO connection table

tcpConnTable :Total number of segments sent excluding retransmission

tcpInErrs :total number of segments received including with errors

tcpOutRsts :no of connections for which the current state is either ESTABLISHED or CLOSED WAIT

212>Match the following

tcpConnTable :remote port number

tcpConnEntry :remote IP address

tcpConnState :local port number

tcpConnLocalAddress :local IP address

tcpConnLocalPort :state of the TCP connection

tcpConnRemAddress :information about a particular TCP connection

tcpConnRemPort :TCO connection table

213>Match the following

udpInDatagrams :information about a particular connection or UDP listener

udpNoPorts :local IP address

udpInErrors :local UDP port

udpOutDatagrams :total number of datagrams delivered to the users

Page 36: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

36

udpTable :total number of received datagrams for which there is no application

udpEntry :number of received datagrams with error

udpLocalAddress :total number of datagrams sent

udpLocalPort :UDP Listener table

214>SNMP management is organized as a two tier management, in which a manager process and agent process

communicate with each other (true/false)___________

215>In SNMP management, the two tier structure can be extended to three tiers by sandwiching

___________between he manager and the agent (proxy agent/RMON/either)

216>All management operations are done using___messages in SNMPv1 (4/5/6)_______

217>All management operations are done using following messages in SNMPv1

a:get request b:get next

c:set request d:get response e:trap

Ans:___________ (a/b/c/d/e/all)

218>In above question, the first__messages are sent from the manager to the agent and the last___are sent by the

agent to manager (2/3)

219>The messages are exchanged according to the specifict defined in___________ (MIB/SMI)

220>SMI is composed of ___________ (name/syntax/encoding rules/all)

221>Managed objects are organized in a virtual database called___________ (MIB/SMI)

222>MIB2 which is a superset of MIB1, consists of_____groups (7/10/11)______

ANSWERS

1>SNMP

2>T

3>NMS

4>NMS

5>both

6>SMI

7>MIB

8>1

9>communication

10>ARPANET

11>ICMP

12>Packet Internet Group

13>PING

14>PING

15>Internet Advisory Board

16>IAB

17>Simple Gateway Monitoring Protocol

18>SGMP

19>SNMP, SGMP

20>2

21>b,c

22>InterNIC

23>Internet Network Information Center

24>Standard RFC

25>For Your Information RFC

26>Internet Assigned Numbers Authority

27>IANA

28>FYI

29>STD

30>2

31>all

32>1157, 1905, 1906

33>1155

34>1213,17

35>1907

36>organization

37>information

38>network agent, network manager

39>T

40>Remote Monitoring

Page 37: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

37

41>RMON

42>both

43>Hybrid Fiber Coax

44>T

45>Internet

46>UDP

47>1157

48>1157

49>1155, 1156

50>5

51>all

52>a,b,c

53>d,e

54>event

55>trap

56>get-request

57>get-next-request

58>set-request

59>get-response

60>trap

61>both

62> true, dynamic

63> static, virtual

64>manager, agent

65>both

66>information

67>1

68>SMI

69>MIB

70>1155, 1213

71>1-b 2-c 3-a

72>both

73>object type, object instance

74>Object type

75>ASN.1, BER

76>both

77>ASN.1

78>4

79>all

80>directory

81>mgmt

82>experimental

83>private

84>ASN.1

85>3

86>all

87>primitive, application, structured

88>T

89>non-aggregate

90>subtype

91>INTEGER

92>all

93>all

94>both

95>1- 2- 3- 4-

96>1- 2- 3- 4- 5- 6-

97>SEQUENCE, SEQUENCE OF

98>OCTET

99>OBJECT IDENTIFIER

100>defined

101>Opaque

102>Opaque

Page 38: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

38

103>NetworkAddress

104>IpAddress

105>Counter

106>32

107>Gauge

108>32

109>TimeTicks

110>32

111>Opaque

112>Opaque

113>Opaque

114>T

115>SET,SET OF

116>SEQUENCE,SEQUENCE OF

117>b

118>a

119>all

120>all

121>all

122>all

123>all

124>BER,TLV

125>1-c 2-b 3-c 4-b 5-b 6-a

126>0,1

127>IP address, Counter, Gauge, TimeTicks

128>1-f 2-g 3-e 4-a 5-c 6-b 7-d

129>5

130>all

131>T

132>OBJECT DESCRIPTOR, OBJECT IDENTIFIER

133>Syntax

134>definition

135>access

136>either

137>status

138>aggregate, subordinate

139>macro

140>3

141>all

142>TYPE, VALUE

143>all

144>all

145>aggregate

146>6,1-5

147>5

148>--

149>INDEX

150>REFERENCE

151>INDEX, DEVAL

152>T

153>aggregate

154>1155

155>1213

156>virtual

157>T

158>SMI

159>3

160>all

161>deprecated

162>object group, aggregate object type

163>all

164>a

Page 39: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

39

165>System

166>Interface

167>Address Translation

168>CMOT

169>Transmission

170>SNMP

171>CMOT

172>transmission

173>1-f 2-g 3-e 4-h 5-d 6-i 7-c 8-j 9-b 10-k 11-a

174>System

175>T

176>7

177>all

178>Interface

179>T

180>both

181>ifNumber, ifTable

182>1-d 2-e 3-c 4-f 5-b 6-g 7-a

183>1-c 2-d 3-e 4-f 5-b 6-a

184>1-c 2-d 3-f 4-b 5-a 6-e

185>1-d 2-c 3-e 4-b 5-f 6-a

186>1-d 2-c 3-e 4-b 5-f 6-a

187>ifType

188>inbound, outbound

189>NetworkAddress, physical address

190>IP

191>IP

192>T

193>all

194>ipForwarding

195>1-g 2-h 3-f 4-b 5-c 6-d 7-e 8-a

196>1-h 2-g 3-f 4-e 5-c 6-b 7-a 8-d

197>1-f 2-e 3-d 4-g 5-b 6-a 7-c

198>

199>1-d 2-c 3-e 4-b 5-f 6-a 7-g

200>1-h 2-i 3-j 4-k 5-e 6-d 7-g 8-c 9-f 10-b 11-a 12-l

201>1-d 2-e 3-f 4-c 5-b 6-a

202>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a

203>1-h 2-g 3-f 4-d 5-c 6-b 7-a 8-e

204>ipForwardPolicy

205>ICMP

206>1-h 2-i 3-g 4-f 5-e 6-d 7-c 8-b 9-a

207>1-d 2-e 3-f 4-g 5-h 6-i 7-c 8-b 9-a

208>1-h 2-g 3-f 4-e 5-d 6-c 7-b 8-a

209>all

210>1-h 2-g 3-f 4-e 5-d 6-c 7-b 8-a

211>1-g 2-f 3-e 4-c 5-d 6-b 7-a

212>1-g2-f 3-e 4-d 5-c 6-b 7-a

213>1-d 2-e 3-f 4-g 5-h 6-a 7-b 8-c

214>T

215>proxy agent

216>5

217>all

218>3,2

219>SMI 220>all 221>MIB 222>11

Page 40: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

40

CHAPTER 5: SNMPv1 NETWORK MANAGEMENT —

COMMUNICATION AND FUNCTIONAL MODELS

1>The SNMPv1 communication model defines the specifications of____ aspects of SNMP communication

(3/4/5)______

2>The SNMPv1 communication model defines the specifications of following aspects of SNMP communication

a: architecture

b: administrative model

c: SNMP protocol

d: SNMP MIB

Ans:__________ (a/b/c/d/all)

3>__________model defines data access policy (communication/administrative)

4>A manager can belong to multiple communities and thus can manage multiple domains.This is the__________

model (communication/administrative)

5>SNMP entities are grouped into __________module (SNMP SMI/SNMP MIB)

6>___________consists of communication between network management stations and managed network elements

or objects (SNMP protocol/SNMP architecture)

7>___________is used to communicate information between the network management stations and the

management agents in the elements (SNMP MIB/SNMP protocol)

8>Following are goals of the architecture in the original specifications of SNMP

a: it should minimize the number and complexity of the management functions realized by the management agent

b: it should be flexible enough to allow expansion

c: the SNMP architecture should be independent of the architecture and mechanisms of particular hosts and

gateways

Ans:___________ (a/b/c/all)

9>Only non-aggregate objects are communicated using SNMP (true/false)___________

10>___________is used for data transfer in SNMP (ASN.1/BER/both)

11>The SNMP manages the network with ____messages (3/4/5)_______

12>SNMP comprises following basic messages

a: set

b: get

c: trap

Ans:__________ (a/b/c/all)

13>_____&______messages are generated by the manager to retrieve data from network elements using the

associated management agents (get-request/set-request/get-next-request/trap)

14>___________is used to initialize and edit the parameters of the network element (get-request/set-request)

15>___________is the response from the agent to get and set messages from the manager (get-next-request/get-

response-request)

16>The number of unsolicited messages in the form of_________is limited to make the architecture simple and to

minimize the traffic (get-request/set-request/get-next-request/trap)

17>There are__ types of traps (2/3/4)_________

18>Following are different types of traps

a: generic trap

b: specific trap

c: time stamp

Ans:___________ (a/b/c/all)

19>___________type consists of coldStart, warmStart, linkDown,linkUp,authenticationFailure, egpNeighborLoss

and enterpriseSpecific (generic trap/specific trap/time stamp)

20>___________is a specific code and is generated even when an enterpriseSpecific trap is not present (generic

trap/specific trap/time stamp)

21>___________is the time elapsed between the last initialization or reinitialization of the element and the

generation of the trap (generic trap/specific trap/time stamp)

22>In RFC 1157,the entities that reside in the management stations and network elements are called

SNMP___________ entities (protocol/application)

23>The peer processes, which implement the SNMP, and thus support the SNMP application entities are termed

as__________ entities (protocol/MIB)

Page 41: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

41

24>Application entity residing in the management station is also referred to as _____and the application entity

residing in the element is also referred to as_____ (SNMP agent/SNMP manager)

25>The pairing of the SNMP manager and SNMP agent is called ___________ (SNMP view/SNMP community)

26>The authentication scheme is a filter module in the manager and in the agent (true/false)___________

27>A network element comprises many managed objects both standard and private (true/false)___________

28>A management agent may be permitted to view only a subset of the network element's managed objects. This is

called___________ (SNMP community/community MIB view)

29>A pairing of the SNMP MIB view with the SNMP access mode is called___________ (SNMP

community/community profile)

30>Each community name is assigned _______either READ-ONLY or READ-WRITE (SNMP MIB view/SNMP

access mode) ____

31>___________is combination with the access mode of a managed object determines the operations that can be

performed n the object by an agent (SNMP community/community profile)

32>The SNMP agent with ________access mode can perform all operations --get ,set and trap on objects (READ-

ONLY/READ-WRITE)

33>If the SNMP agent has ___________access privilege, it can perform only get and trap operations on objects

(READ-ONLY/READ-WRITE)

34>There are__ access privileges (3/4/5)_________

35> SNMP has following access privileges

a: read only b: write only

c: read write d: none

Ans:___________ (a/b/c/d/all)

36>If the access mode is defined as________, that operand is available for all three operations--get,set and trap

(read-only/read-write/write-only)___

37>___________access mode is used to set the value of MIB object by the network manager (read-only/read-

write/write-only)

38>sysContact: read-write:: sysDescr:_____ (read-only/write-only)

39>A pairing of an SNMP community with an SNMP community profile is defined as___________ (community

MIB view/SNMP access policy)

40>___________defines the administrative model of SNMP management (community MIB view/SNMP access

policy)

41>The SNMP agent associated with the proxy policy is called________ (proxy agent/proxy server/either)

42>___________monitors a non-SNMP community with non-SNMP agent and then converts the objects and data

to SNMP-compatible objects and data feed to an SNMP manager (SNMP agent/proxy agent)

43>SNMP agent:____:: Proxy agent:_______ (SNMP community/Non-SNMP community)

44>The peer processes, which implement hue SNMP, and thus support the SNMP application entities are

called___________ entities (MIB/protocol)

45>An SNMP message consists of___________ (version identifier/community name/PDU/all)

46>An SNMP protocol entity is received on port ____on the host except for trap which is received on port_______

(143/144/161/162)

47>The maximum length of the protocol in SNMPv1 is ___________bytes (848/484)

48>A managed object is a scalar variable (true/false) ___________

49>The pairing of the variable and value is called___________ (variable binding/VarBind/Either)

50>Correct format of Get and Set Type PDUs (in order)

a: PDU type| RequestID |Error Status |VarBind1 name|

VarBind1 Value

b: PDU type| VarBind1 name|

VarBind1 Value| RequestID |Error Status

Ans: ___________ (a/b/both)

51>In Get and Set type PDUs format ,______is used to indicate that an error occurred while _____is used to

provide additional information on the error status (ErrorIndex/ErrorStatus)

52>The generic trap consists of___ types (5/6/7)________

53>______trap is not covered by the enterpriseSpecific trap (generic/specific)_____

54>SNMP operations comprise get and set messages from ____to ____,and get & trap messages from____ to_____

(manager/agent)

55>Correct format of Trap PDU (in correct order)

a: PDU Type| Enterprise | Agent address | Generic Trap type Timestamp | VarBind1 name| VarBind1 value| Specific

trap type

b: PDU Type| Enterprise | Agent address | Generic Trap type | Specific trap type | Timestamp | VarBind1 name|

VarBind1 value

Ans:___________ (a/b/either)

56>Match the following

Page 42: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

42

coldStart :failure of one of the communication link

warmStart :one of the links has come up

linkDown :authentication failure

linkUp :loss of EGP neighbor

authenticationFailure :enterprise specific trap

egpNeighborLoss :sending protocol entity is reinitializing itself, agent configuration or protocol entity

implementation not altered

enterpriseSpecific :sending protocol entity is reinitializing itself, agent’s configuration or protocol

entity implementation may be altered

57>wrt Get-Request Operation for a System group, Arrange the following commands in correct sequence

a: GetRequest (sysObjectID.0)

b: GetResponse (sysObjectID.0=enterprise.11.2.3.10.1.2)

c: GetReques (sysDescr.0)

d: GetResponse (sysDescr.0="SunOS")

Ans:___________ (cdba/cdab)

58>wrt Get-Next-Request Operation for a System group, Arrange the following commands in correct sequence

a: GetNextRequest (sysDescr.0)

b: GetResponse (sysObjectID.0=enterprise.11.2.3.10.1.2)

c: GetRequest (sysDescr.0)

d: GetResponse (sysDescr.0="SunOS")

e: GetNextRequest (sysObjectID.0)

Ans:___________ (cdbae/cdabe)___________

59>Arrange the following numbers in lexographic order 1118 115 126 15 1

Ans:___________ (1 1118 126 115 15 /1 1118 115 126 15)

60>Get-next-request has following advantages

a: we dont need to know the object identifier of the next entity

b: we do not know how many rows exist in the table

c: we can use it to build a MIB tree by repeating the request from any node to any node.This is called MIB walk

Ans:___________ (a/b/c/all)

61>wrt Get-Next-Request operation for the MIB ,arrange the following commands in correct sequence

a: GetNextRequest (B)

b: GetResponse (T.E.1.1)

c: GetRequest (A)

d: GetResponse (A)

e: GetNextRequest (B)

f: GetRespons (B)

Ans:___________ (cdeafb/cdefab)

62>___________is a management tool that can capture the packets going across a transmission medium

(filter/sniffer)

63>Match the following

snmpInPkts :total number of messages from transport service that have tooBig errors

snmpOutPkts :total number of messages delivered from transport service

snmpInBadVersions :total number of ASN.1 And BER errors

snmpInBadCommunityNames :total number of messages from transport service,not allowed operation by

the sending community

snmpInBadCommunityUses :total number of messages from transport service that are of unknown

community name

snmpInASNParseErrs :total number of messages from transport service that are of unsupported

version

snmpInTooBigs :total number of messages delivered to transport service

64>Match the following

snmpInNoSuchNames :total number of messages from transport service that have 'noSuchName' errors

snmpInBadValues :total number of messages from transport service that have redOnly errors

snmpInReadOnlys :Total number of messages from transport service that have badValue errors

snmpInGenErrs :total number of messages from transport service that have genErr errors

snmpInTotalSetVars :Total number of successful Get-Request and Get-Next messages received

snmpInTotalReqVars :total number of objects successfully altered by Set-Request message recieved

snmpInGetRequests :total number of Get-Request PDUs accepted and processed

snmpInGetNexts :total number of Get-Next PDUs accepted and processed

65>Match the following

snmpInSetRequests :total number of Get-Response PDUs accepted and processed

Page 43: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

43

snmpInGetResponses :total number of Set-Request PDUs accepted and processed

snmpInTraps :total number of trap PDUs accepted and processed

snmpOutTooBigs :total number of SNMP PDUs generated for which error status is tooBig

snmpOutNoSuchNames :total number of SNMP PDUs generated for which error status is noSuchName

snmpOutBadValues :total number of SNMP PDUs generated for which error status is badalue

snmpOutGenErrs :total number of SNMP PDUs generated for which error status is genErr

66>Match the following

snmpOutGetRequests :total number of SNMP Get-Request PDUs generated

snmpOutGetNexts :override option to generate authentication failure traps

snmpOutSetRequests :total number of SNMP trap PDUs generated

snmpOutGetResponses :total number of SNMP Get-Response PDUs generated

snmpOutTraps :total number of SNMP Set-Request PDUs generated

snmpEnableAuthenTraps :total number of SNMP Get-Next PDUs generated

67>Application functions are limited to network management in SNMP and not to the services provided by the

network (true/false)___________

68>The OSI mode addresses ___areas of functions (4/5/6)________

69>The OSI mode addresses following areas of functions

a: configuration b: fault

c: performance d: security

e: accounting

Ans:___________ (a/b/c/d/e/all)

70>Performance counters are part of the SNMP agent MIB. It is the function of the SNMP __________to do the

performance analysis (agent/manager)

71>___________model is protocol entity specifications addresses security function is basic SNMP

(architecture/administrative)

72>___________function is not addressed by the SNMP model (administrative/accounting)

73>All management operations are done using_____ messages in SNMPv1 (3/4/5)______

74>All management operations are done using following messages in SNMPv1

a: get-request

b: get-next-request

c: set-request

d: get-response

e: trap

Ans:___________ (a/b/c/d/e/all)

75>In q74,the first three messages are sent from _____to ______and the last two are sent by_____to ______

(manager/agent)

76>___________model deals with the administrative model structure and the five SNMP message PDU

(administrative/communication)

77>___________model defines the community within which messages can be exchanged

(administrative/communication)

ANSWERS 1>4

2>all

3>administrative

4>administrative

5>SNMP MIB

6>SNMP architecture

7>SNMP protocol

8>all

9>T

10>both

11>5

12>all

13>get-request, get-next-request

14>set-request

15>get-response-request

16>trap

17>3

18>all

19>generic-trap

Page 44: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

44

20>specific-trap

21>time-stamp

22>application

23>protocol

24>SNMP manager ,SNMP agent

25>SNMP community

26>t

27>T

28>community MIB view

29>community profile

30>SNMP access mode

31>community profile

32>READ-WRITE

33>READ-ONLY

34>4

35>all

36>read-write

37>write-only

38>write-only

39>SNMP access policy

40>SNMP access policy

41>either

42>proxy agent

43>SNMP community, non-SNMP community

44>protocol

45>all

46>161,162

47>484

48>T

49>variable binding

50>a

51>ErrorStatus, ErrorIndex

52>7

53>specific-trap

54>manager to agent & vice versa

55>b

56>1-g 2-f 3-a 4-b 5-c 6-d 7-e

57>cdab

58>cdabe

59>1 1118 115 126 15

60>all

61>cdefab

62>sniffer

63>1-b 2-g 3-f 4-e 5-d 6-c 7-a

64>1-a 2-c 3-b 4-d 5-f 6-e 7-g 8-h

65>1-b 2-a 3-c 4-d 5-e 6-f 7-g

66>1-a 2-f 3-e 4-d 5-c 6-b

67>T

68>5

69>all

70>manger

71>administrative

72>accounting

73>5

74>all

75>manager to agent & vice versa

76>communication

77>administrative

Page 45: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

45

CHAPTER 8: SNMP MANAGEMENT – RMON

1>The characterization of computer network performance is statistical in nature (true/false)__________

2>Sniffer is a passive operation and does nothing to the packets, which continue onto their destinations. This

approach is called _______ (monitoring/probing) and the device the performs that function is called (network

monitor/probe)

3>RMON stands for__________

4>The monitored information, gathered and analyzed locally can be transmitted to a remote network management

station. In such a case, remotely monitoring the network with a probe is referred to as__________ (RMAN/RMON)

5>Advantages of RMON are

a: each RMON device monitors the local network segment and does the necessary analyses

b: RMON reduces the need for agents in the network to be visible at all times to the NMS

c: RMON pings locally and hence has less chance of losing packets, thus increasing monitoring reliability

d: individual segments can be monitored almost continuously

e: higher network availability for users and greater productivity for administrators

Ans: __________ (a/b/c/d/e/all)

6>RMON relays information in both solicited and unsolicited fashion to the NMS (true/false)___________

7>The RMON structure of management information is similar to that of__________in defining the object types

(MIB/SMI)

8>RMON MIB has been developed in___ stages (3/4/5)________

9>RMON1 is covered by RFC=____for Ethernet LAN and RFC=____ for extension to token ring LAN

(1757/1271/1513/2021)

10>RMON=__ addressed parameters at the OSI layer 2 and RMON=__ addressed the parameters associated with

OSI layers 3-7 (1/2/3)_______

11>RFC=____ for RMON2 (2021/1271)_______

12>The RMON group consists of___ Ethernet RMON1 groups, ___token ring extension group to RMON1,

and___RMON2 groups for the higher layers (1/9/10)

13>following new data types are defined in the RMON1 textual conventions___________

(OwnerString/EntryStatus)

14>The owner identification is made part of the control table defined by____ data type ._______is used to resolve

conflicts that might arise between management systems in the manipulation of control tables

(OwnerString/EntryStatus)

15>___________is specified in the NVT ASCII character set as DisplayString (OwnerString/EntryStatus)

16>The EntryStatus data type can exist in one of following states

a: valid

b: createRequest

c: underCreation

d: invalid

Ans: __________ (a/b/c/d/cal)

17>Match the following

Valid: row is not fully active

createRequest: delete the row by disassociating the mapping of this entry

underCreation: create a new row by creating this object

Invalid: row exists and is active, it is fully configured and operational

18>RMON__ performs numerous functions at the data link layer (1/2)_________

19>wrt RMON1 Group and functions, the data gathered can serve as inputs to ___sets of functions (3/4/5)________

20>In RMON1 Group and functions, ___________statistics deals with traffic data associated with the hosts,

ranking the traffic for the top N hosts , and conversation between hosts (Ethernet /token/host & conversation)

21>In RMON1 Group and functions, filter group is cascade of __filters (2/3/4)_________

22>The functions associated with the various groups are performed by___ groups associated with the RMON1 MIB

(9/10/11)________

23>In RMON1 Group and functions, the groups fall into___ categories (3/4/5)________

24> RMON1 Group and functions, the groups fall into following categories

a: statistics gathering groups

b: network event reporting function

c: filtering input packets according to selected criteria

Ans: ___________ (a/b/c/all)

Page 46: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

46

25>In RMON1 groups and functions, the group fall into three categories, the largest of which is the category

of___________ (network event reporting function/filtering input packets/statistics gathering groups)

26>Match the following

Statistics: computes the top N hosts on the respective categories of statistics gathered

History: gathers statistical data on hosts

Alarm: provides link level statistics

Host: collects periodic statistical data and stores them for later retrieval

Host top N: generates events when the data sample gathered crosses pre-established thresholds

27>Match the following

Matrix: controls the generation of events and notifications

Filter: provides packet capture capability for gathering packets after they flow through a channel

Packet capture: performs filter function that enables capture of desired parameters

Event: gathers statistics on traffic between pairs of hosts

28>_____enhancement helps keep track of data with the changes in control .______enables an application to

download only those rows that changed after a particular time (LastCreateTime/TimeFilter)

29>____table contains row of data._______ table defines the instances of the data rows in the ____table and can be

set to gather and store different instances of data (control/data)

30>Match the following

controldataSource: is the entity or person that created the entry

controlTableSize: identifies the source of the data being collected

controlOwner: identifies the entries associated with the data source

31>___________group contains the statistics measured by the probe for each monitored Ethernet interface on a

device (matrix/statistics)

32>The history group consists of following subgroups___________ (history control group/history data group/both)

33>_____group controls the periodic statistical sampling of data from various types of networks (history control

history data )______

34>___________group is extremely helpful in tracking the overall trend in the volume of traffic (history control

history data )

35>___________group periodically takes statistical samples on specified variables in the probe and compares them

with the preconfigured threshold stored in the probe (statistic/alarm)

36>wrt alarm group, the sampling type is ______value (absolute/delta/either)_____

37>wrt alarm group, in_____ value, the absolute value of the variable at the end of the previous period is stored as

an alarm value.____ value, the absolute value at the end of a period is subtracted from the beginning of the period,

and the computed value is stored (delta/absolute)__

38>An example of _____value is a new interface on a test for infant mortality (delta/absolute)______

39>An example of _______value is a threshold set to 10000 packets in a 10 second interval for excessive packet

loss (delta/absolute)____

40>______group contains information about the hosts on the network (host top n/host)_____

41>The host group comprises of following tables

a: hostControlTable

b: hostTable

c: hostTimeTable

Ans: ___________ (a/b/c/all)

42>Match the following

hostControlTable : contains the same data as the host table but it is stored in the time order in which the

host entry was discovered

hostTable : controls the interfaces on which the data gathering is done

hostTimeTable : contains statistics about the host

43>___________group generates reports ranking the top N hosts in selected statistics categories (host/host top N)

44>________group stores statistics on conversations between pairs of hosts (statistics/matrix)

45>Match the following

matrixControlTable : keeps track of the source to destination conversations

matrixSDTable : keeps the data by destination to source traffic

matrixDSTable : controls the information to be gathered

46>___________group is used to base the capture of filter packets on logical expressions (event/packet

capture/filter)

47>wrt filter group, the stream of data based on a logical expression is called___________ (link/channel)

48>The filter group contains ___________ (filter table/channel table/both)

49>___________is a post filter group and it captures packets from each channel based on the filter criteria of packet

and channel filters in the filter group (packet capture/channel capture)

50>___________group controls the generation and notification of events (trap/event)

Page 47: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

47

51>In RMON Token ring extension group, _____statistics group collects data on token ring parameters

.______statistics group collects statistics on the number of packets of various sizes and the type of packets

(promiscuous/MAC layer)

52>The data are stored in______. The rings and parameters to be monitored are controlled by_____

(ringStationControlTable/ringStationTable)

53>Match the following

Statistics : station order

promiscuous statistics : active configuration of ring stations

MAC layer history : utilization statistics of source routing information

promiscuous history : current utilization and error statistics of the MAC layer

ring station : current utilization and error statistics of promiscuous data

ring station order : historical utilization and error statistics of promiscuous data

ring station configuration : historical utilization and error statistics of

source routing : station statistics

54>RMON=___ dealt primarily with data associated with the OSI data link layer (1/2)________

55>RFC=___for MON2 (2012/2021)________

56>The RMON2 MIB is arranged in___ groups (9/10/11)________

57>Match the following

Protocol directory : traffic data from each pair of hosts

Protocol distribution : traffic data from and to each host

Address map : MAC address to network address on the interfaces

Network layer host : inventory of protocols

Network layer matrix : relative statistics on octets and packets

58>Match the following

Application layer host : RMON2 MIB compliances and compliance groups

Application layer matrix : configuration of probe parameters

User history collection : user specified historical data on alarms and statistics

Probe configuration : traffic data by protocol from and to each host

RMON conformance : traffic data by protocol between pairs of hosts

59>_____group identifies the protocols that the probe can monitor ._____group provides information on the relative

traffic of different protocols (protocol distribution/protocol directory)

60>_____group measures the traffic sent from and to each network address representing each host discovered by

the probe.______ group provides information on the conversation between pairs of hosts in both directions

(network layer matrix/network layer)

61>The RMON2 conformance group consists of following subgroups___________

(rmon2MIBCompliances/rmon2MIBGroups)

62>There ___groups in rmon2MIBGroups (10/11/12/13)________

63>Following groups has optional requirement

a: rmon1EnhancementGroup

b: rmon1EthernetEnhancementGroup

c: rmon1TokenRingEnhancementGroup

Ans: ___________ (a/b/c/all)

64>RMON=__dealt with data link layer and RMON=___with higher level layers (1/1)______

65>RFC=___for ATM protocol IDs for RMON2 (2047/2074)________

66>Extending RMON to____ devices requires design changes and new functionality (token ring/ATM)_______

67>The ATM RMON MIB is under _____node of the IETF Internet MIB (organizational/experimental)______

68>Match the following

portSelect : ATM per-circuit

atmStats : ATM per host statistics

atmHost : basic statistics

atmMatrix : port selection

69>Following are tables n atmHost group: ___________ (atmStatsControlTable/atmStatsTable/both)

70>atmMatrix contains __data tables and___ control tables (2/3/4)______

71>The three top groups of users contributing to __ of the Internet traffic were

students, newsgroup services, domain (64/74/84)

72>The growth rate of Internet use is about___% (25/50/75)________

73>___________of the network involves the use of remotely positioned probes in various segments of the network

(remote maintaining/remote monitoring)

ANSWERS

1>T

Page 48: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

48

2>either, either

3>Remote Network Monitoring

4>RMON

5>all

6>T

7>SMI

8>3

9>1757,1513

10>1,2

11>2021

12>9,1,10

13>both

14>OwnerString, EntryStatus

15>OwnerString

16>all

17>1-d 2-c 3-a 4-b

18>1

19>4

20>host & conversation

21>2

22>10

23>3

24>all

25>statistics gathering groups

26>1-c 2-d 3-e 4-b 5-a

27>1-d 2-c 3-b 4-a

28>LastCreateTime,TimeFilter

29>data table

30>1-b 2-c 3-a

31>statistics

32>both

33>history group

34>history group

35>alarm

36>either

37>absolute, delta

38>absolute

39>delta

40>host

41>all

42>1-b 2-c 3-a

43>host top N

44>matrix

45>1-c 2-a 3-b

46>filter

47>channel

48>both

49>packet capture

50>event

51>MAC layer, promiscuous

52>ringStationTable, ringStationControlTable

53>1-d 2-e 3-g 4-f 5-h 6-a 7-b 8-c

54>1

55>2021

56>10

57>1-d 2-e 3-c 4-b 5-a

58>1-d 2-e 3-c 4-b 5-a

59>protocol directory, protocol distribution

60>network layer host, network layer matrix

61>both

62>13

63>b,c

Page 49: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

49

64>1,2

65>2074

66>ATM

67>experimental

68>1-d 2-c 3-b 4-a

69>both

70>3,2

71>84

72>50

73>remote monitoring

Page 50: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

50

CHAPTER 9: BROADBAND NETWORK MANAGEMENT

-- ATM NETWORKS

1>Broadband networks can be classified into following distinct categories: __________ (WAN/access

network/both)

2>____is predominantly based on ATM technology .______is based on cable modem, digital subscriber loop and

wireless technologies (WAN/access network)

3>__________ISDN is also known as Basic ISDN (wideband/narrowband)

4>__________is a low bandwidth network that can carry two 56 kilobaud rate channels (wideband/narrowband)

5>__________network can transport very high data rate signals (broadband/narrowband)

6>Following are different types of information technology services:

a: voice

b: video

c: data

Ans: ___________ (a/b/c/all)

7>______transports signals over long distances between switching offices, and _____covers the last mile from a

switching office to the customer's premise (Local loop/WAN)

8>__________ network is also called multimedia networking (narrowband/broadband)

9>___________networks are also called BISDN (narrowband/broadband)

10>Those who provide multimedia services to customers are broadband service providers and are referred to

as________ (MOM/MOTIS/MSO)

11>Basic ISDN consisted of two basic channels: ___channels , each with a 56 kilobaud rate, combined with an 8

kilobaud signaling ___ channel (A/B/C/D)___

12>Broadband networks and services have contributed significantly to advances in following areas

a: ATM

b: SONET/SDH

c: broadband access technology

Ans: __________ (a/b/c/all)

13>The ATM technology can be viewed as a hybrid of _____and ______switched transmission modes

(packet/message/circuit)

14>The data rate of SONET/SDH WAN is an integral multiple of the basic OC-1/STS, which is ____Mbps

(51.84/155.52)_______

15>Broadband access technology is implemented in one of following ways

a: HFC technology

b: DSL technology

c: wireless technology

Ans: ___________ (a/b/c/all)

16>__________is a two way interactive multimedia communication system that uses fiber and coaxial cable

facilities and cable modems (DSL/HFC)

17>The customer network consists of following classes

a: residential customers

b: corporate customers

Ans: __________ (a/b/both)

18>wrt broadband service networks, the service providers interface with WAN via___________ (router/gateway)

19>___________network is based on ATM technology and broadband access technology (broadband/corporate)

20>___________network is based on switches with point to point connections in contrast to one to many

connections as in_______ (broadcast protocol/ATM)

21>ATM is a connection-oriented protocol (true/false)___________

22>___________has helped bring about the merger of computer and telecommunication networks

(broadband/ATM)

23>Following important concepts comprise ATM technology

a: virtual path- virtual circuit

b: fixed packet sizes or cells

c: small packet sizes

d: statistical multiplexing

e: integrated services

Ans : ___________ (a/b/c/d/e/all)

Page 51: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

51

24>___________is an organization that specifies standards for ATM implementation (ATM consortium/ATM

forum)

25>Table 9.1___________

26>In ATM, because the path is fixed for the entire session, the transmission rate is considerably ______than a non-

virtual circuit packet switched network (slower/faster)_____

27>A virtual path-virtual circuit can be established for each session as needed and removed after the session. This

method is called___________ (PVC/SVC)

28>A connection can be established for long periods of time and not switched between sessions, creating

_______between a pair of end stations that carry large traffic volumes (SVC/PVC)____

29>________are established between locations of large corporations (SVC/PVC)

30>ATM packets are of fixed size, each being ___bytes long (53/55)________

31>The ATM packet size of 53 bytes comprises of a header of___ bytes and a payload of ___bytes

(4/5/48/49)_____

32>The ATM packet size of 53 bytes is chosen by optimizing following factors

a: packet size should be as small as possible to reduce the delay in switching and packetization

b: packet size should be large enough to reduce the overhead of the header relative to the payload

Ans : ___________ (a/b/both)

33>Pure video w/o sound can have___________ priority in terms of delay than a combination of audio and video

can (less/high)

34>____ traffic require low tolerance on variations in delay and low end-to-end delays for good interactive

communication (data/video/voice/all)

35>___________traffic can have a much higher tolerance on latency because it is primarily a store and forward

technology and the traffic itself inherently occurs in bursts (data/video/voice/all)

36>_____main classes of traffic have been defined to implement quality of service (3/4/5)______

37>Following main classes of traffic have been defined to implement quality of service

a: CBR

b: VBR-rt

c: VBR-nrt

d: ABR

Ans : ___________ (a/b/c/d/all)

38>in ATM, Transmission of voice is assigned___________ (CBR/VBR-rt/VBR-nrt/ABR)

39>Streaming video such as real time video on the Internet is assigned___________ (CBR/VBR-rt/VBR-nrt/ABR)

40>___________is assigned to transmission of still images (CBR/VBR-rt/VBR-nrt/BR)

41>IP data traffic gets the lowest bandwidth priority___________ (CBR/VBR-rt/VBR-nrt/ABR)

42>There are two markets for ATM switches using ATM technology: ___________ (public/protected/private)

43>_____network is established by service providers. ______network is primarily a campuslike network

(public/protected/private)

44>The basic voice band, 0-4 kHz is converted to ___Kbps digital signal universally (16/32/64)________

45>T1 transmission carrier has a data rate of____ Mbps and carrier ___voice channels (1.544/2.048/24/30)_

46>E1 transmission carrier has a data rate of____ Mbps and carrier ___voice channels (1.544/2.048/24/30)

47>The digital hierarchy has been synchronized throughout the world using _____Mbps are the basic data rate in

carrier technology and using fiber optics (51.84/155.52) ______

48>The optical carrier starts with the unit of OC-1, which is______ Mbps (51.84/155.52)_____

49>Advantages of ATM LAN are

a: it interfaces nicely with an ATM SONET network

b: it is adaptable for a high speed backbone for a camps network that can function at a higher speed than FDDI

Ans : ___________ (a/b/both)

50>The services provided by ATM differ from conventional LAN in following ways

a: ATM is connection oriented

b: ATM makes a one-to-one connection between pairs of workstations in contrast to the broadcast con multicast

mode in the conventional LAN

c: LAN MAC address is dedicated to the physical network interface card and this is independent of network

topology

Ans : ___________ (a/b/c/all)

51>LANE stands for___________

52>___________emulates the services of a current LAN network across an ATM network by using layered

architecture (LUNI/LANE)

53>in layered architecture of a LAN emulation, following layers are inserted between the ATM layer and the LLC

layer: ___________ (ATM adaptation layer/LAN emulation layer/both)

54>In layered architecture of a LAN emulation, ______interfaces with the ATM layer underneath it, and _____is

sandwiched between the ATM adaptation layer and the LLC layer (ATM adaptation layer/LAN emulation layer)

Page 52: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

52

55>The ATM forum specified ___________which provides the interface between the user and the LAN emulation

layer (LUNI/LANE)

56>LUNI stands for___________

57>In layered architecture of a LAN emulation, arrange the following in correct sequence (from top to bottom)

a: physical layer

b: ATM adaptation layer

c: logical link control layer

d: network layer

e: LAN Emulation layer

f: ATM

Ans : ___________ (fdbcae/fbdaec/fdbace)

58>In layered architecture of a LAN emulation, an ATM end station is called___________ (LE server/LE client)

59>In the LUNI interface, two LECs communicate with each other over an ATM network using___________ (LE

client/LE services)

60>Following are LE Services in LUNI interface

a: LECS

b: LES

c: BUS

Ans : ___________ (a/b/c/all)

61>LECS stands for___________

62>LES stands for___________

63>BUS stands for___________

64>In the LUNI interface, ___implements assignment of individual LECs to different emulated LANs.____

performs a control coordination function for ELAN , registering and resolving MAC addresses or route descriptors

to ATM addresses .____handles data sent by the LEC to a broadcast MAC address, a multicast address, and the

initial unicast frames before the address resolution is performed by the LEC (LES/BUS/LECS)

65>Following functions are performed across LUNI in the LUNI interface

a: initialization

b: registration

c: address resolution

d: data transfer

Ans : __________ (a/b/c/d/all)

66>In LUNI interface, Initialization involves following

a: obtaining ATM address of LES that are available on a particular ATM network

b: joining or leaving a particular emulated LAN specified by the ATM address of the LES

c: declaration whether the LEC across the LUNI is to receive address resolution requests for all unregistered

destinations

Ans : ___________ (a/b/c/all)

67>Match the following wrt the LUNI interface

Initialization : informs the LES of the individual MAC address that the LEC represents and route

descriptors for source route bridging

Registration : involves obtaining the ATM address representing the LEC with a particular MAC

address

address resolution : involves transporting the data from source to destination

data transfer : involves obtaining ATM address of LES that are available on a particular ATM

network

68>ATM is a switch that establishes ___________circuit between input and output ports (connection-

oriented/connectionless)

69>In LAN emulation client connections across LUNI, an ATM LAN establishes a virtual circuit connection

between pairs of ____going through the switch ( LECS/LEC)______

70>In LAN emulation client connections across LUNI, ________provides the translation between 20 byte ATM

address and the 6 byte MAC address (LEC/LES/LECS)

71>In LAN emulation client connections across LUNI, the LEC sends the broadcast or multicast PDU to the

broadcast and unknown server via___________ (collapsed connection/controlled connection)

72>Every LAN emulation client belongs to___________ (LECS/LES/BUS)

73>___________implements the assignment of the individual LEC to various segments (LECS/LES/BUS)

74>The most popular implementation of LAN emulation currently is to use ATM switches in the backbone network

of a campus environment called___________ (controlled backbone design/collapsed backbone design)

75>___________is a topology and location independent group of stations that are communicating as though they

were on the same physical LAN (VPN/VLAN)

76>The LAN emulation configuration server can be configured to form________group (VPN/VLAN)

Page 53: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

53

77>___________network management consists of managing the wide area and local area networks with ATM

technology and the access networks from a central office to a remote workstation (narrowband service/broadband

service)

78>Wide area network facilities are provided by public service providers, who perform the following management

functions

a: operation

b: administration

c: maintenance

d: provisioning

Ans : ___________ (a/b/c/d/all)

79>ATM networks are classified as both private and public networks (true/false)___________

80>____________ATM network is an enterprise network (public/private)

81>In the ATM forum management interface reference architecture, ___&____are the interfaces between a private

NMS and either an end user or a private network respectively (M1/M2/M3/M4/M5)____

82>In the ATM Forum management interface reference architecture, a private network management system can

access its own network related information in a public network via___ interface to the public network management

system (M1/M2/M3/M/M5)_________

83>In ATM forum management interface reference architecture, ___interface is between the public NMS and the

public network. The interface ______is between the NMSs of two service providers (M1/M2/M3/M4/M5)___

84>The ATM forum defines an ATM link specific view of configuration and fault parameters across a UNI. The

specifications for them are contained in the___________ (IETF/ILMI)

85>ILMI stands for___________

86>The 'I' In ILMI designates___________ (Interim/Integrated)

87>ATM management information is communicated across the UNI or the NNI (true/false)___________

88>The devices communicate across UNI and NNI via an ATM _______module in the entity (IME/ILMI)____

89>IME stands for___________

90>Following are versions of IME

a: user

b: network

c: system

Ans : ___________ (a/b/c/all)

91>ILMI communication takes place over both physical and virtual links by means of _________protocol

(SNMP/AAL5/either)

92>BICI stands for___________

93>BICI is also known are___________ (UNI/NNI)

94>The management information baseand the structure of management information required for an ATM network

are specified in following document

a: one by IETF

b: one by ATM forum

Ans : ___________ (a/b/both)

95>Major branches of the Internet ATM MIB Are: ___________ (mib2/atmForum/both)

96>The structure of management information is defined in ____syntax. _____associated with ATM is primarily

concerned with ATM sublayer parameters (MIB/SMI/ASN.1)__

97>___________group contains subgroups for each medium of transmission (interface/system/transmission)

98>ATM objects, as defined in the atmMIBObjects group under atmMIB, are specified in RFC=____

(1573/1695)_______

99>The atmForum Group is subnode ____under the enterprise node (353/335)_______

100>The atmForum Group contains ___subgroups (3/4/5)________

101>The atmForum group contains the following subgroups

a: atmForumAdmin

b: atmForumUni

c: atmUniDxi

d: atmLanEmulation

e: atmForumNetworkManagement

Ans : __________ (a/b/c/d/e/all)

102>__________group is defined in the ILMI specification (ATM Administrative /ATM UNI/both)

103>__________group is the ATM interface between DTE and DCE (ATM UNI/ATM DXI)

104>DXI stands for__________

105>ATM network management uses__________ (SNMP MIB/ATM Forum MIB/both)

106>Match the following

System : RFC1695

Interfaces : RFC1407

Page 54: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

54

ifMIB : RFC1213

Transmission : RFC1573

ds1 : RFC1595

ds3 : RFC1406

sonetMIB:

atmMIB:

107>Match the following

ifMIB : ATM forum MIB/M3 specification

atmMIB : remote monitoring MIB extensions for ATM networks

atmForum : ATM administrative

atmRmon : ATN user network interface

atmForumAdmin : data exchange interface specification

atmForumUni : ATN emulated LAN MIB

atmUniDxi : SNMP M4 network element view MIB

atmLanEmulation : interface types

atmForumNetworkManagement : ATM objects

108>ATM objects are specific in RFC=_______ (1965/1695)

109>AME stands for__________

110>__________protocol is used for communication between the AME in two devices (SNMP/ILMI)

111>Match the following

ifXTable : information on the relationship between sublayers

ifStackTable : information on the type of packets/frames accepted on an interface

ifTestTable : tests that NMS instructs the agent to perform

ifRecvAddressTable : additional objects for the interface table

112>Following are transmission modes used for ATM__________ (ds1/ds2/sonet/all)

113>DS1: ___Mbps: : DS3: ____Mbps: : SONET: ___Mbps (n155.52/1.544/44.736)

114>ATM __________group contains information needed to manage the ATN sublayer entities: traffic descriptors,

DS3 PLCP, TC sublayer parameters, virtual path link/virtual channel link and their associated cross-connect tables,

and performance parameters for AAL5 (system/interface/object)

115>___________specification define the administrative and UNI groups of the ATM forum MIB (IETF/ILMI)

116>__________group defines a general purpose registr for locating ATM network services such as the LECS and

the ANS (transmission/administrative)

117>ANS stands for__________

118>PLCP stands for__________

119>Match the following

atmNoTrafficDescriptor : virtual path link table

atmInterfaceConfTable : virtual channel link table

atmInterfaceDs3PlcpEntry : ATM traffic descriptor type

atmInterfaceTCTable : ATM local interface configuration parameter table

atmVpITable : ATM interface DS3 PLCP parameters and state variable table

atmVclTable : ATM TC sublayer configuration and state parameters table

120>Match the following

atmTrafficDescrParamTable : AAL VCC performance parameters table

atmVpCrossConnectIndexNext : virtual cross-connect table

atmVpCrossConnectTable : index for virtual channel cross connect table

atmVpCrossConnectIndexNext : virtual path cross connect table

atmVpCrossConnectTable : index for virtual path cross connect table

aal5VccTable : ATM traffic descriptor type and associated parameters

121>Match the following

atmfPhysicalGroup : deprecated

atmfAtLayerGroup : defines a table of status and parameter information on the virtual path connections

atmfAtmStatsGroup : defines a table of status and parameter information on the virtual channel connections

atmfVpcGroup : defines the network side IME table containing the user side ATM layer addresses

atmfVccGroup : defines a table of physical layer status and parameter information

atmfAddressGroup : defines a table of ATM layer status and parameter information

122>Match the following

atmfNetPrefixGroup :defines a table of operational parameters related to ABR virtual channel

connections

atmfSrvcRegistryGroup : defines a table of operational parameters related to ABR virtual path connections

atmfVpcAbrGroup : defines the network side IME table containing all services available to the user

Page 55: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

55

side IME

atmfVccAbrGroup : defines a user side IME table of network prefixes

123>__________management interface is between the private NMS and the public NMS (M1/M1/M3/M4/M5)

124>M3 requirements has following classes

a: status & configuration monitoring

b: virtual configuration control

Ans : ___________ (a/b/both)

125>In ATM, M3 class=___requirements are those that a public NMS offers to the customers, monitoring and

management of configuration, fault and performance of a specific customer's portion of a public ATM network

(1/2/3) ________

126>In ATM, M3 class=___service provides greater capability to the user , who can request the public NMS to add,

delete or change virtual connections between pairs of the customer's UNIs (1/2/3)______

127>In ATM, M3 class 1 service is offered only for _____configuration (SVC/PVC)______

128>In ATM, examples of M3 class1 service are

a: retrieving performance and configuration information for a UNI link

b: public NMS reporting of a UNI link failure via a alarm or trap message to the user NMS

Ans : __________ (a/b/both)

129>In ATM, example of M3 class2 service are

a: customer wanting to establish a new virtual path

b: increase the number of virtual circuits in a given virtual path

Ans : ___________ (a/b/both)

130>CNM stands for_________

131>___________manages both private and public ATN networksCNM/CNP)

132>In ATM , M3 class=___requirements are mandatory, and M3 class=___requirements are optional (1/2/3)_____

133>M3 class2 functionality is divided into following subgroups

a: ATM level subgroup

b: VPC/VCC level subgroup

c: traffic subgroup

Ans : __________ (a/b/c/all)

134>The VPC/VCC level subgroup provides the CNM the ability to modify

a: virtual path link configuration and status configuration information

b: virtual channel link configuration and status information

c: virtual path connection configuration and status information

d: virtual channel connection configuration and status information

Ans : __________ (a/b/c/d/all)

135>The traffic subgroup provides the CNM the ability to modify

a: traffic descriptors and information objects for virtual channel connections

b: traffic descriptors and information objects for virtual path connections

Ans : __________ (a/b/both)

136>Match the following

General UNI protocol stack information : All tables except dsx3ConfigTable, all

ATM performance information on customer's UNI : atmInerfaceConfTable of ATM MIB

Physical layer performance and status information : dsx3ConfigTable

ATM level information configuration information : system group, interface group, SNMP group

Physical layer configuration information : ifTable

137>Match the following

ATM layer virtual path link configuration and status information : warmStart, coldStart, linkUp,

linkDown of SNMP group

ATM layer virtual channel link configuration and status information :atmTrafficDescrParamTable of

ATM MIB

ATM layer virtual path connection configuration and status information : atmVcCrossConnectTable &

atmVcCrossConnectIndexNext

of ATM MIB

ATM layer virtual channel connection configuration and status information: atmVpCrossConnectTable &

atmVpCrossConnectIndexNext

of ATM MIB

ATM layer traffic characterization information : atmVclTable of ATM MIB

Event notifications on ATM link going up or down : atmVpITable of ATM MIB

138>Match the following

ATM level information configuration information : atmTrafficDescrParamTable in ATM

MIB

Page 56: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

56

Virtual path link configuration and status configuration information : atmVpCrossConnectTable &

atmVpCrossConnectIndexNext of ATM MIB

Virtual channel link configuration and status information : atmVplTable in ATM MIB

Virtual path connection configuration and status information : atmInterfaceConfTable in ATM MIB

Virtual channel connection configuration and status information : atmVclTable in ATM MIB

Traffic descriptors & info objects for virtual path & channel connections: atmVcCrossConnectTable &

atmVcCrossConnectIndexNext

of ATM MIB

139>The management of __________ATM networks is primarily the responsibility of network service providers--

carriers, PTTs and RBOCs (private/public)

140>To manage public networks, ITU-T has defined _____layer model operations --the TMN (3/4/5)_____

141>TMN stands for__________

142>In ATM relationship to TMN layered architecture, __________layer contains network elements

(element/element management/network management)

143>Match the following

EL : manages network elements

EML: manages the network either directly or via EML

NML: contains network elements (NE)

144>EML stands for__________

145>NML stands for__________

146>A network view of management's physical configuration consists of following ATM networks

a: one a single supplier subnetwork

b: one a multiple supplier subnetwork

Ans: __________ (a/b/both)

147>In a network view of management physical configuration, __________manages the network elements for each

subnetwork (subNMS/NMS)

148>The NMS environment can manage both network elements and networks (true/false)__________

149>The ATM Forum M4 Network element view specifications currently support only__________ (SVC/PVC)

150>Configuration management provides the following functions to manage NEs

a: ATM NE configuration identification and change reporting

b: configuration of UNIs, BICI, and BISSIs

c: configuration of VPL/VCL termination points and cross connections

d: configuration of VPC and VCC OAM segment end points

e: event flow control, the event forwarding discriminator function

Ans : __________ (a/b/c/d/e/all)

151>ATM NE configuration identification and change reporting involves

a: operations performed over the craft interface

b: human intervention

c: customer control channels

d: network failures

e: protection switching events

f: subATM NE component initialization

g: secondary effects of atomic operations performed by the management systems

Ans : ___________ (a/b/c/d/e/f/g/all)

152>The following set of functions is specified for detecting, isolating and correcting abnormal operations (ie fault

management)

a: notifying the NMS of a detected failure

b: logging failure reports

c: isolating faults via demand testing

Ans : ___________ (a/b/c/all)

153>In fault management, specific functions are

a: failure reporting of the various alarms

b: OAM cell loopback testing

Ans : _________ (a/b/both)

154>The functions of performance monitoring (management) for an ATM network are

a: performance monitoring

b: traffic management

c: network data collection

d: UPC/NPC disagreement monitoring

e: performance management control

Ans : ___________ (a/b/c/d/all)

Page 57: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

57

155>UPC stands for___________

156>NPC stands for___________

157>Processing error alarm category has following generic trouble

a: storage capacity problem

b: memory mismatch

c: corrupt data

d: software environment problem

e: software download failure

f: version mismatch

Ans : __________ (a/b/c/d/e/f/all)

158>Environmental alarm category has following generic trouble

a: cooking fan failure

b: enclosure door open

c: fuse failure

d: high temperature

Ans : __________ (a/b/c/d/all)

159>General alarm category has following generic trouble: __________ (vendor specific/version mismatch)

160>_________ alarm category has generic trouble such as AIS, LCD , LOF , LOP , LOS, payload type mismatch,

transmission error, path trace mismatch, RDI and Signal label mismatch (Communication/equipment)

161>In performance management, the following specific functions carry out the general functions

a: physical layer performance monitoring

b: ATM cell level protocol monitoring

c: UPC/NPC disagreement monitoring

Ans: __________ (a/b/c/all)

162>______network view for the management of an ATM public network is concerned with network management

layer information (M1/M2/M3/M4/M5)

163>wrt M4 network view interface, the functional areas addressed in the specifications are

a: transport network configuration provisioning

b: transport network connection management

c: network fault management

d: network security management

Ans : __________ (a/b/c/all)

164>Transport network provisioning includes (subnetwork provisioning of network nodes and links)

a: subnetwork provisioning for the addition and monitoring information on addition, deletions and changes in NEs

and their configurations

b: link provisioning for the set up, modification and release of subnetwork links

Ans : __________ (a/b/both)

165>The M4 network view managed entities support the subnetwork management of reservation and modification

of subnetwork connections, link connections, trails and segments which involves

a: point-to-point VP/VC subnetwork connections between pairs of end points

b: multipoint subnetwork VP/VC connections between pair-wise end points

c: link VP/VC connections between subnetworks

d: segment set up and support of VP/VC segment termination end points

e: trail set up and support of trails containing information on subnetwork connections and links

Ans : __________ (a/b/c/d/e/all)

166>The connections release across the M4 interface involves the management of resources to be made available

after use, and should support

a: release of subnetwork connections and release of resources of both point-to-point and multipoint connections

b: release of link connections between subnetworks

Ans : __________ (a/b/both)

167>M4 interface management is required to report network view alarms and provide testing to isolate the

problems including

a: provision of log network alarms within a subnetwork to be retrieved by the NMS

b: autonomous notification of failures such as termination point failures

c: provision of loopback capability that supports OAM cell loopback along a subnetwork connection or a segment

of it

Ans : _________ (a/b/c/all)

168>The main security objectives of network security management are

a: confidentiality of stored and transferred information

b: data integrity of stored and transferred information

c: accountability for all ATM network service invocations and for ATM network management activities

d: availability of correct access to ATM facilities

Page 58: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

58

Ans : __________ (a/b/c/d/all)

169>___________generic threats are considered in the threat analysis of an ATM network (5/6/7)

170>Following generic threats are considered in the threat analysis of an ATM network

a: masquerade or spoofing

b: eavesdropping

c: unauthorized access

d: loss or corruption of information

e: repudiation

f: forgery

g: denial of service

Ans : __________ (a/b/c/d/e/f/g/all)

171>Match the following

verification of identities : access control

controlled access and authorization : confidentiality

Protection of confidentiality, transferred data : integrity

Protection of confidentiality, stored data : non-repudiation

protection of data integrity, transferred data : user authentication

protection of data integrity, stored data : security alarm, audit trail and recovery

strong accountability:

activity logging:

alarm reporting:

audit:

172>In LAN emulation, we are concerned with following servers

a: LES

b: BUS

c: LECS

Ans : __________ (a/b/c/all)

173>Following MIB modules are under the ATM LANE module

a: elanMIB

b: lesMIB

c: busMIB

Ans : ___________ (a/b/c/all)174>In ATM LANE emulation MIB, ___enables a network manager to change the

configuration of ELANs .___&____allow reading back the current status of the ELANs (elanMIB/lesMIB/busMIB)

175>ELAN stands for__________

176>__________MIB deals with information required for a LEC to join an ELAN (VLAN/ELAN)

177>Following manual steps are necessary in creating an ELAN

a: create a new ELAN in the elanMIB

b: create a LES entry for that ELAN using the lesMIB

c: create a BUS entry for that ELAN using the busMIB

Ans : __________ (a/b/c/all)

178>The elanMIB consists of following groups

a: ELAN administration b: ELAN configuration c: ELAN LECS

Ans : __________ (/b/c/all)

179>Match the following wrt elanMIB

ELAN administration group : allows the configuration and monitoring of LECS

ELAN configuration group : is a registry for the LEC assignment policy types

LECS configuration group : provides the configuration for emulated LANs

180>LAN emulation server MIB contains following groups

a: LES configuration group

b: LES statistics group

c: LES-LEC statistics group

d: LES fault management group

Ans : __________ (a/b/c/d/all)

181>Match the following

LES configuration group : is responsible for maintaining a log of errors in LES

LES statistics group : provides information on LES configuration and topology

LES-LECS statistics group : measures performance and fault data

LES fault management group : has the entire LAN emulation ARP request-related counter and error counts

on a per LEC-LES pair basis

182>busMIB consists of following groups

a: BUS configuration group

Page 59: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

59

b: BUS statistics group

c: BUS fault management group

Ans : __________ (a/b/c/all)

183>Match the following

BUS configuration : provides information on BUS statistics and BUS LEC statistics

BUS statistics : addresses BUS errors and maintains a log of the errors

BUS fault management group : provides information on BUS topology

184>__________is between DTE and DCE and connects o a public data network (DSU/DXI)

185>____is a hub or router, and ______is a DSU , which interfaces with an ATM switch (DTE/DCE/DXI)

186>LMI stands for__________

187>The ATM _______defines the protocol for exchanging information across the DXI and supports DXI-, AAL-

and UNI-specific management information (LES/LMI)

188>__________protocol supports the SNMP management system and the IME running on an ATM switch

(LES/LMI)

189>ATM is based on _____transmission (cell/packet)_____

190>ATM is a hybrid of ____&______mode transmissions (message/packet/circuit)

191>__________, which is an outgrowth of switched hub development, is well suited for the ATM environment

(ELAN/VLAN)

192>The OSI standards have identified ___M Interfaces for managing ATM networks (3/4/5)_______

193>Match the following

M1: manages private ATM networks

M2: manages ATM network elements

M3: manages the network at the network element level using the network element view or at the network

management level using the network view

M4: is between the NMSs of two service providers

M5: manages ATM network elements

194>____defines the management interface of the ATM network for public service providers

(M1/M2/M3/M4/M5)______

195>Number of levels in TMN as defined by OSI standard (4/5/6)__________

196>Fault, performance and security management specifications are addressed in the __interface specifications

(M1/M2/M3/M4/M5)

ANSWERS

1>both

2>WAN, access network

3>narrowband

4>narrowband

5>broadband

6>all

7>WAN, local loop

8>broadband

9>broadband

10>MSO

11>B,D

12>all

13>circuit, packet

14>51.84

15>all

16>HFC

17>both

18>gateways

19>broadband

20>ATM, broadcast protocol

21>T

22>ATM

23>all

24>ATM forum

25>

26>faster

27>SVC

28>PVC

Page 60: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

60

29>PVC

30>53

31>5,48

32>both

33>less

34>voice & video

35>data

36>4

37>all

38>CBR(Constant Bit Rate)

39>VBR-rt(Variable Bit Rate-real time)

40>VBR-nrt(Variable Bit Rate-non real time)

41>ABR(Adjustable bit rate)

42>private, public

43>public, private

44>64

45>1.544,24

46>2.048,30

47>155.52

48>51.84

49>both

50>all

51>LAN Emulation

52>LANE

53>both

54>ATM adaptation layer, LAN emulation layer

55>LUNI

56>LAN Emulation User Network Interface

57>dcebfa

58>LE client

59>LE service

60>all

61>LE configuration server

62>LE server

63>Broadcast & Unknown Server

64>LECS,LES,BUS

65>all

66>all

67>1-d 2-a 3-b 4-c

68>connection-oriented

69>LEC

70>LES

71>controlled connection

72>BUS

73>LECS

74>collapsed backbone design

75>VLAN

76>LAN

77>broadband service

78>all

79>T

80>private

81>M1,M2

82>M3

83>M4,M5

84>ILMI

85>Integrated Local Management Interface

86>Integrated

87>T

88>IME

89>Interface Management Entity

90>all

Page 61: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

61

91>either

92>Broadband Inter Carrier Interface

93>NNI

94>both

95>both

96>ASN.1,MIB

97>transmission

98>1695

99>353

100>5

101>all

102>both

103>ATM DXI

104>Data Exchange Interchange

105>both

106>1-c 2-c 3-d 4-c 5-f 6-b 7-e 8-a

107>1-h 2-i 3-a 4-b 5-c 6-d 7-e 8-f 9-h

108>1695

109>Agent Management Entity

110>ILMI

111>1-d 2-a 3-c 4-b

112>all

113>1.544,44.736, n*155.52

114>object

115>ILMI

116>administrative

117>ATM name answer server

118>Physical Layer Convergence Parameter

119>1-c 2-d 3-e 4-f 5-a 6-b

120>1-f 2-e 3-d 4-c 5-b 6-a

121>1-e 2-f 3-a 4-b 5-c 6-d

122>1-d 2-c 3-b 4-a

123>M3

124>both

125>1

126>2

127>PVC

128>both

129>both

130>Customer Network Management

131>CNM

132>1,2

133>all

134>all

135>both

136>1-d 2-e 3-a 4-b 5-c

137>1-f 2-e 3-d 4-c 5-b 6-a

138>1-d 2-c 3-e 4-b 5-f 6-a

139>public

140>5

141>Telecommunication Management Network

142>element layer

143>1-c 2-a 3-b

144>Element Management Layer

145>Network Management Layer

146>both

147>subNMS

148>T

149>PVC

150>all

151>all

152>all

Page 62: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

62

153>all

154>all

155>User Parameter Control

156>Network Parameter Control

157>all

158>all

159>vendor specific

160>communication

161>all

162>M4

163>all

164>both

165>all

166>both

167>all

168>all

169>7

170>all

171>1-e 2-a 3-b 4-a 5-c 6-a 7-d 8-f 9-f 10-f

172>all

173>all

174>elanMIB, lesMIB, busMIB

175>Emulated LAN

176>ELAN

177>all

178>all

179>1-b 2-a 3-c

180>all

181>1-b 2-c 3-d 4-a

182>all

183>1-c 2-a 3-b

184>DXI

185>DTE,DCE

186>Local Management Interface

187>LMI

188>LMI

189>cell

190>packet&circuit

191>VLAN

192>5

193>1-e 2-a 3-b 4-c 5-d

194>M4

195>5

196>M4

Page 63: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

63

CHAPTER 10: BROADBAND NETWORK MANAGEMENT

1>Following different types of customers have access to broadband networks

a: corporate or enterprise users who have campuswide networks

b: service providers

c: residential and small business customers who have multimedia requirements

Ans: __________ (a/b/c/all)

2>MSO stands for__________

3>HFC stands for__________

4>Following types of access technology are currently available to residential and small business customers

a: HFC/cable modem

b: DSL

Ans: __________ (a/b/both)

5>In the case of __________network, information is transmitted to the cable modem at the customer site from an

MSO facility (DSL/HFC)

6>The access network based on_______ uses the existing twisted pair loop facility from a central office to the

customer premises (DSL/HFC)

7>Different modes of access rely on following technologies

a: HFC cable

b: DSL

c: wireless communication

d: satellite communication

Ans: ___________ (a/b/c/d/all)

8>Broadband access technologies currently consist of following mutually independent methods

a: HFC cable

b: DSL

c: wireless communication

d: satellite communication

Ans: ___________ (a/b/c/d/all)

9>___________uses television transmission facilities and cable modems, and is the most widely deployed means

of access of the four (HFC/DSL/wireless/satellite)

10>In _____way telephony return configuration, the downstream signal to the customer traverses cable

(one/two)______

11>In____ way HFC mode, both upstream and downstream are handled by the HFC medium using a cable modem

(one/two)_______

12>DSL technology has 3 different implementations and is generally referred to as xDSL , where the x represents

asymmetric (A), high speed (H) Or very high speed (V) transmission (true/false)_______

13>Following broad categories of service are being offered in wireless access technology

a: MMDS/WCS

b: LMDS

c: ISM

Ans: ___________ (a/b/c/all)

14>MMDS/WCS stands for___________

15>LMDS stands for___________

16>ISM stands for__________

17>___________operates over the 2500-2686 MHz band and includes both one-way wireless with telephony return

and two-way wireless implementations, it has a range of up to 35 miles (MMDS/WCS or LMDS or ISM)

18>___________operates over two frequency bands, it has a range of about 3miles (MMDS/WCS or LMDS or

ISM)

19>___________operates over two frequency bands , the lower band has a range of only 0.5 mile but the higher

band has a range of up to 15 miles (MMDS/WCS or LMDS or ISM)

20>___________technology is based on existing cable television technology (DSL/HFC)

21>The signal going from the head end to the customer premises is called ___________signal

(downstream/forward path/either)

22>The signal going from the customer premises to the head end is called___________ signal (upstream/reverse

path/either)

23>NIU stands for___________

24>NID stands for___________

Page 64: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

64

25>At the customer premises, ___________is the demarcation point between the customer network and service

provider network (NIU/NID/either)

26>The _________modem converts analog signal to Ethernet output (cable/telephone)

27>Match the following

Telephone modem ,28.8 kbps : approximately 1 second

ISDN ,4 kbps : 6-8 minutes

cable mode, 10 Mbps : 1-1.5 minutes

28>The HFC broadband system with ___can process data much faster than can a conventional____or____

(ISDN/telephone modem/cable modem)

29>HFC technology is based on

a: broadband LAN

b: asymmetric bandwidth allocation to achieve two way communication

c: radio frequency spread spectrum technique for carrying multiple signals over the HFC

d: radio frequency spectrum allocation to carry multimedia telephony , television and computer communication

services

Ans: ___________ (a/b/c/d/all)

30>In Broadband LAN architecture, the downstream signals are in the _____MHz band and the upstream signals

are in the______ MHz band (5-42/50/860)

31>In Broadband LAN architecture, the downstream bandwidth of a channel is ____MHz and the upstream

bandwidth varies from___ kHz to ____MHz (3.2/6/200)

32>___________modem modulates and demodulates the digital signal from the customer equipment to the radio

frequency signal carried on the cable (telephone/cable/either)

33>Following different modulation techniques support different capabilities in cable modem

a: ASK

b: FSK

c: PSL

Ans: ___________ (a/b/c/all)

34>In cable modem, the most commonly used modulation technique are___________ (QPSK/QAM/both)

35>_____is the number of bits per second traversing the medium .______is the number of signal units per second

(baud rate/bit rate)

36>_____equals ______times the number of bits per symbol (bit rate/baud rate)

37>In____ modulation, the four levels are represented by the four states 0, 90, 270 and 180 (QAM/QPSK)_______

38>Phase shift keying is limited by the difficulty of detecting small phase shifts (true/false)___________

39>___________is the preferred method of modulation for the downstream signal in the cable modem

(QPSK/QAM)

40>Match the following

Toshiba : 40Mbps

RCA DCM105 : 38Mbps

Cisco : 10Mbps

LANcity : 5.36 Msym/sec

Motorola:

41>Cable modems with a downstream speed of___ Mbps and an upstream speed of ____Mbps are commonly

available now (10/30/40)____

42>______uses pseudotree topology (DSL/HFC)

43>MCNS stands for___________

44>DAVIS stands for___________

45>DOCSIS stands for___________

46>___________standard being developed by the MCNS is the industry standard for cable modem system

specification (DOCSIS/DAVIS)

47>Some cable modems are designed as one way, and the return path is via telephone link called___________

(telco return/telecom return)

48>CMTS stands for___________

49>All cable modems terminate at a server called ___________at the head end (LMDS/CMTS)

50>___________consists of multiple pairs of optical fibers connecting fiber nodes (DSL plant/HFC plant)

51>In an HFC network, the coaxial cable that connects to the NIU in the home is referred to as___________ in

CATV terminology (tap to cable/tap to TV)

52>The spectrum use in HFC extends only to____ MHz (750/860)_______

53>In Cable modem, the upstream signal is allocated the low end of the spectrum from___ to ___ MHz. The

downstream signal is allocated from___ to ___MHz (5/42/54/750)

Page 65: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

65

54>Using noisy conditions, the cable modem could dynamically switch to different downstream and upstream

channels to improve the quality of service. Such a feature is called_____ (phase agile capability/frequency agile

capability)

55>CMCI stands for___________

56>DOCS-OSSI stands for___________

57>CMTRI stands for___________

58>DOCSS stands for___________

59>RFI stands for___________

60>In data over cable system reference architecture, the head end is connected to WAN, and multiple head ends can

be connected via the WAN to a regional center head end. In such a case, the local head end is referred to

as___________ hub (centralized/distribution)

61>DOCSIS places interfaces into following categories

a: data interface

b: operations support system interfaces and telephony return interface

c: RF and security interfaces

Ans: ___________ (a/b/c/all)

62>Match the following

data interface : RFI ,DOCSS

operations support system interfaces & telephony return interface : CMTRI ,DOCS-OSPG

RF & security interface : CMCI, CMT-NSI CMTS

63>Management of an HFC system with cable modems is more complex than the management of

___________network (computer/telecommunication/either)

64>Management of ____network is involved with data layers. Management of _______network is involved with

physical layer (computer/telecommunication)

65>HFC management encompasses ___________management (data layer/physical layer/both)

66>Following functional area are identified in the management of BIDS

a: network maintenance

b: subscriber support

c: planning

Ans: ___________ (a/b/c/all)

67>BIDS stands for___________

68>At the physical layer, HFC access network management functions include

a: detection of errors and corrections of ingress noise interference

b: amplifier gains

c: signal levels at the cable modems

d: power supply voltages

Ans: ______ (a/b/c/d/all)

69>At the data link layer, HFC access network management functions include

a: traditional configuration management

b: fault management

c: performance management

Ans: ___________ (a/b/c/all)

70>Cable modem and CMTS can be managed with ___________management (SMTP/SNMP)

71>CMTS is also called___________ (trail end reference/head end reference)

72>DOCS stands for ___________

73>The HFC element management can be divided into following components

a: cable modem management

b: CMTS management

c: HFC link management

d: RF spectrum management

Ans: ___________ (a/b/c/d/all)

74>The DOCS interface objects group, docsIfMIBObjects, has following subgroups

a: base interface objects group

b: CM interface objects group

c: CMTS interface objects group

Ans: ___________ (a/b/c/all)

75>The baseline privacy objects group, docsBpiMIBObjects, has ____subgroups (7/8/9)_______

76>Match the following

docsBpiCmObjects : baseline privacy CMTS multicast control group

docsBpiCmBaseTable : baseline privacy CMTS authorization table

docsBpiCmTEKTable : baseline privacy CMTS objects

Page 66: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

66

docsBpiCmtsObjects : baseline privacy CM base and authorization table

docsBpiCmtsBaseTable : baseline privacy objects for CM

docsBpiCmtsAuthTable : baseline privacy traffic encryption key table

docsBpiCmtsTEKTable : baseline privacy CMTS base table

docsBpiMulticastcontrol : baseline privacy CMTS traffic encryption key table

77>Match the following

docsQosMIBObjects : mapping of flows to service classes

docsQosIpPktClass-Table : set of DOCSIS Qos flows active in the device

docsQosEthPktClass-Table : contains QOS table

docsQosServiceClassGroup : IP packet classification table containing class information on direction,

type, flow, source and destination

docsQosServiceClassTable : DOCSIS QOS extensions of MIB objects

docsQosFlowTable : ethernet packet classification containing information similar to the IP packet

docsQosSidToClass-Table : set of DOCSIS QOS service classes defined in the managed object

docsQosFlowToClassTable : mapping of service classes to SIDs

78>Match the following

docsDevMIBObjects : CPE IP management and anti-spoofing group on cable modems

docsDevBase : provides control and logging for event reporting

docsDevNmAccessTable : provides information for network downloadable software upgrades

docsDevSoftware : extends MIB2 system group with objects needed for cable device system

management

docsDevServer : Objects of the cable modem and CMTS device

docsDevEvnt : defines the minimum level of SNMP access security

docsDevFilter : provides information about the progress of the interaction with various

provisioning servers

docsDevCpe : configures filter at link layer and IP layer for bridged data traffic

79>SMS stands for___________

80>____________deals with the management of RF spectrum allocations to different digital services both in the

downstream and upstream bands (MMS/SMS)

81>the main motivating factor for employing _____for access technology in multimedia service is the preexistence

of local loop facilities to most residences (HFC/DSL)______

82>HDSL stands for___________

83>ADSL stands for___________

84>VDSL stands for___________

85>___________operates at a T1 or E1 data rate in a duplex mode with two pairs of wires (ADSL/HDSL/VDSL)

86>SDSL stands for___________

87>The duplex mode is defined as___ way communication with the same speed in both direction

(one/two)________

88>___________is the same as the HDSL, except the two way duplex communication occurs ove a single twisted

pair (ADSL/SDSL/VDSL)

89>_____&______both operate asymmetrically (ADSL/SDSL/VDSL/HDSL)

90>_____signal has a larger bandwidth than ______signal (downstream/upstream)

91>The difference between ADSL and VDSL is that _______operates at higher data rates over shorter lines

than____ (VDSL/ADSL)

92>ATU stands for___________

93>ATU is also baked the________ modem (HDSL/ADSL)

94>POTS stands for___________

95>Development is in progress to eliminate the splitter at the customer site. This configuration is referred to

as___________ (ADSL lite/HDSL lite)

96>Following are the schemes for separating the upstream and downstream frequency bands: ___________

(FDM/echo cancellation/both)

97>In___________, after the upstream and downstream bands have been separated, each band is divided into one

or more high speed channels and one or more low speed channels (FDM/echo cancellation)

98>DSLAM stands for___________

99>ONU stands for___________

100>CEBus Stands for___________

101>PDN stands for__________

102>SOHO stands for__________

103>PSTN stands for__________

104>Real time signals such as audio and real time video, use a fast buffering scheme and hence are referred to

as__________ (fast channel/interleaved channel)

Page 67: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

67

105>Digital data that can tolerate delay make use of slow buffers and are interleaved between fast signals. The

digital data channel is referred to as__________ (fast channel/interleaved channel)

106>ADSL management is __________the line encoding scheme used (dependent on/independent of)

107>CAP stands for __________

108>DMT stands for__________

109>The echoing phenomenon occurs in telephone systems because of crosstalk between neighboring pairs of wires

in a bundle (true/false)__________

110>Two signals transmitted from a central office can couple with each other, which is referred to as__________

crosstalk (near end/far end)

111>Two signals traversing in opposite directions can interfere with each other, which is referred to as__________

crosstalk (near end/far end)

112>Near end and far end crosstalk can be mitigated by using __________technique (FDM/echo cancellation)

113>In__________, the entire loop bandwidth is used in the encoding (DMT/CAP)

114>in__________, the entire bandwidth of approximately 1.1 MHz Is split into 256 subchannels, each of an

approximately 4 kHz band (DMT/CAP)

115>In DMT, the number of downstream subchannels is either____ if echo cancellation is used or ______if echo

cancellation is not used (218/250)_

116>Management of the ADSL network involves following network elements

a: management communications protocol across the network management subinterface of the V interface

b: management communications protocol across the U interfaces between ATU-C and ATU-R

c: parameters and operations with the ATU-C

d: parameters and operations within the ATU-R

e: ATU-R side of the T interface

Ans: __________ (a/b/c/d/e/all)

117>In ADSL network management elements, the management function at the physical layer involves following

entities

a: physical channel

b: fast channel

c: interleaved channel

Ans: __________ (a/b/c/all)

118>Match the following

ADSL line type : time interval to downshift

ADSL line coding : time interval to upshift

Target noise margin : mode1- manual, mode2- select at start up, mode3- dynamic

Maximum noise margin : modem reduces power above this threshold

Minimum noise margin : ADSL coding type

Rate adaptation mode : five types-no channel, fast, interleaved, either or both

Upshift noise margin : noise margin under steady state

Minimum time interval for upshift rate adaptation : modem increase power below this margin

Downshift noise margin : threshold for modem increases data rate

Minimum time interval for downshift rate adaptation : threshold for modem decrease data rate

119>Match the following

Desired maximum rate : vendor specific serial number

Desired minimum rate : vendor specific version

Rate adaptation ratio : vendor ID assigned by T1E1.4

Maximum interleave delay : Rate down change alarm

Alarm thresholds : rate up change alarm

Rate up threshold : 15min count threshold on loss of signal, frame, poser, and error seconds

Rate down threshold : distribution ratio between fast & interleaved channels for available excess bit rate

Vendor ID : maximum transmission delay allowed by interleaving process

Version number : minimum rates for ATU-C/R

Serial number : maximum rates for ATU-C/R

120>Match the following

ADSL line status : initialization failure of ATU-R from ATU-C

Alarms thresholds : event generation upon rate changes when shift margis are crossed in both

upstream and downstream

unable to initialize ATU-R : indicates operational status and various types of failures of the link

rate change : generates alarms on failures or crossing of thresholds

121>Match the following

line attenuation : 15 min/1 day failure statistics

Page 68: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

68

noise margin : transmit delay introduced by the interleaving process

total output power : rate of modem before the last change

maximum attainable rate : data block on which the CRC check is done

current rate : current transmit rate to which the modem is adopted

previous rate : maximum currently attainable data rate by modem

channel data block length : total output power from the modem

interleave delay : measured power loss in dB from transmitter to receives ATU

Statistics : noise margin in dB of the ATU with respect to received signal

122>The ADSL forum has proposed integrating ADSL MIB with the standard IETF interaces group MIB2

interfaces, ifMIB, and transmission in the following manner

a: adslPhysIf: : {transmission 94}

b: adslIterIf: : ={transmission 124}

c: adslFastIf: : ={transmission 125}

Ans: __________ (a/b/c/all)

123>LCS stands for__________

124>___________access technology is primarily focused on bringing multimedia services to residence

(narrowband/broadband)

125>___________carrier information from the head end to the customer premises via fiber optic and coaxial cables

(DSL/HFC)

ANSWERS

1>all

2>Multiple Systems Operators

3>Hybrid Fiber Coaxial

4>both

5>HFC

6>DSL

7>all

8>all

9>HFC

10>one

11>two

12>T

13>all

14>Multi-channel multipoint distribution service/Wireless communication services

15>Local Multipoint Distribution Service

16>Instructional scientific & medical

17>MMDS/WCS

18>LMDS

19>ISM

20>HFC

21>either

22>either

23>Network Interface Unit

24>Network Interface Device

25>NID

26>cable modem

27>1-b 2-c 3-a

28>cable modem, telephone modem, ISDN

29>all

30>50-860,5-42

31>6,200,3.2

32>cable

33>all

34>both

35>bit rate, baud rate

36>bit rate, baud rate

37>QPSK

38>T

39>QAM

40>1-d 2-b 3-b 4-c 5-a

Page 69: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

69

41>40,10

42>HFC

43>Multimedia Cable Network System

44>Digital Audio/Video Interoperability Council

45>Digital Over Cable Service Interface Specifications

46>DOCSIS

47>telco return

48>Cable Modem Termination System

49>CMTS

50>HFC

51>tap to TV

52>860

53>5-42,54-750

54>frequency agile capability

55>Cable Modem to CPE Interface

56>Data Over Cable Service Operations Support System Interface

57>Cable Modem to Telco Return Interface

58>Data Over Cable Security System

59>Cable Modem to RF Interface

60>distribution

61>all

62>1-c 2-b 3-a

63>either

64>computer communication, telecommunication

65>both

66>all

67>Broadband Interactive Data Services

68>all

69>all

70>SNMP

71>head end reference

72>Data Over Cable System

73>all

74>all

75>3

76>1-e 2-d 3-f 4-c 5-g 6-d 7-h 8-a

77>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a

78>1-e 2-d 3-f 4-c 5-g 6-b 7-h 8-a

79>Spectrum Management System

80>SMS

81>DSL

82>High Data Rate Digital Subscriber Line

83>Asymmetric Digital Subscriber Line

84>Very high data rate Digital Subscriber Line

85>HDSL

86>Single line Digital Subscriber Line

87>two

88>SDSL

89>ADSL, VDSL

90>downstream, upstream

91>VDSL, ADSL

92>ADSL Transmission Unit

93>ADSL

94>Plain Old Telephone Service

95>ADSL Lite

96>both

97>FDM

98>Digital Subscriber Line Access Multiplexer

99>Optical Network Unit

100>Consumer Electronics Bus

101>Premises Distribution Network

102>Small Office Home Office

Page 70: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

70

103>Public Switched Telephone Network

104>fast channel

105>interleaved channel

106>dependent on

107>Carrierless Amplitude Modulation

108>Discrete Multi-tone

109>T

110>near end

111>far end

112>echo cancellation

113>CAP

114>DMT

115>250,218

116>all

117>all

118>1-f 2-e 3-g 4-d 5-h 6-c 7-i 8-b 9-j 10-a

119>1-j 2-i 3-g 4-h 5-f 6-e 7-d 8-c 9-b 10-a

120>1-c 2-d 3-a 4-b

121>1-h 2-i 3-g 4-f 5-e 6-c 7-d 8-b 9-a

122>all

123>Line Code Specific

124>broadband

125>HFC

Page 71: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

71

CHAPTER 13: NETWORK MANAGEMENT APPLICATIONS

1>The management of networked information services involves __________ resources (system/network/both)

2>OSI defines network management as___ layer architecture (5/6/7)

3>In OSI network management, at the highest level is __________management that deals with the functions

associated with managing an enterprise (service/business)

4>In OSI, __________level deals with network management or system management (third/fourth)

5>In OSI, network management aggregates and correlates data from network element management activities at

__________level (third/fourth)

6>Network management applications include

a: configuration management

b: fault management

c: performance management

d: security management

e: accounting management

Ans: ___________ (a/b/c/d/d/all)

7>___________management involves detecting a fault as it occurs in the network and subsequently locating its

source (security/fault)

8>___________security is concerned with preventing illegal access to information by unauthorized personnel

(system/network)

9>The business health of an enterprise depends on well maintained ___________management

(accounting/performance)

10>In OSI, _____management at the third level and ______management at the fourth level of the hierarchy are

based on both technical considerations and policy decisions (network/business/service)

11>___________management in network management is normally used in the context of discovering network

topology, mapping the network and setting up configuration parameters in management agents and management

systems (configuration/performance)

12>Network provisioning is considered to be part of __________management (configuration/performance)

13>Network provisioning is also called ___________provisioning in the telephone industry (circuit/connection)

14>______is a circuit from the originating switching center to the destination switching center (trunk/trace)

15>In network provisioning, planning and inventory systems are integrated with design systems to build an overall

system referred to as___________ (service of systems/system of systems)

16>TIRKS stands for__________

17>TMN stands for___________

18>___________is used in the automated circuit provisioning of trunks, which are logical circuits between

switching offices and traverse many facilities (TIRKS/TMN)

19>In___________ packet switched circuit, each packet takes an independent path and the switching of each packet

by the routers at various nodes is based on the load in the links (connection-oriented/connectionless)

20>In___________ communication, excess packets can be stored in buffers in routers or retransmitted in the event

that packets are lost or discarded (stop&wait/store&forward)

21>In___________ circuit communication, permanent and switched virtual circuit demands need to be

accommodated for end-to-end demands on the various links (connection-oriented/connectionless)

22>Provisioning of the links is based on

a: average demands

b: peak demands

c: performance statistics

d: quality of service requirements

Ans: ___________ (a/b/c/d/all)

23>Network provisioning for packet switched network is based on

a: average demands

b: peak demands

c: performance statistics

d: quality of service requirements

Ans: ___________ (a/b/c/d/all)

24>Fault management involves following processes

a: fault detection

b: fault location

c: service restoration

Page 72: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

72

d: identification of problem's root cause

e: problem resolution

Ans: ___________ (a/b/c/d/e/all)

25>Fault detection is accomplished by using

a: polling scheme

b: generation of traps

Ans: ___________ (a/b/either)

26>One of the advantages of_____ over ______is that failure detection is accomplished faster with less traffic

overhead (traps/polling)

27>The ideal solution to locating and isolating the fault is to have___________ solution (artificial intelligence/agile

intelligence)

28>___________is a system tool used to measure traffic monitoring on Ethernet LANs (Protocol sniffer/protocol

analyzer)

29>___________management involves data monitoring, problem isolation, performance tuning, analysis of

statistical data for recognizing trends, and resource planning (fault/performance

30>The parameters that can be attributed to defining network performance on a global level are

a: throughput

b: response time

c: network availability

d: network reliability

Ans: ___________ (a/b/c/d/al)

31>The response time of a network depends on___________ performance (network/system/both)

32>The application responsiveness on the network, more than any other measure, reflects whether the network is

meeting the end users' expectations and requirements (true/false)___________

33>Following are different types of metrics to measure application responsiveness

a: application availability

b: response time between user and server

c: burst frame rate is the rate at which the requested data arrives at the user station

Ans: ___________ (a/b/c/all)

34>RFC=____defines the architecture for the measurement and reporting of network traffic flows (2063/2036)

35>The network is characterized as traffic passing through following representative levels

a: backbone networks

b: regional network

c: stub/enterprise

d: end systems or hosts

Ans: ___________ (a/b/c/d/all)

36>The architecture defines following entities for traffic flow measurements

a: meters

b: meter readers

c: managers

Ans: ___________ (a/b/c/all)

37>Data monitoring i the network for abnormal performance behavior are detected by___________ messages

generated by RMON probes (poll/trap)

38>___________are used in tuning a network, validating a service level agreement (problem isolation/performance

statistics)

39>SLA stands for___________

40>The variation in network delay is known as___________ (wander/jitter)

41>When a centralized network management system receives a trap or a notification , it is called___________

(sending an event/receiving an event)

42>The method used by management system to correlate all the events and to isolate the root cause of the problem

is called ___________techniques (receiving an event/event correlation)

43>Several correlation techniques are used to isolate and localize fault in networks. All are based on

a: detecting and filtering of events

b: correlating observed events to isolate and localize the fault either topologically or functionality

c: identifying the cause of the problem

Ans: ___________ (a/b/c/all)

44>Following are different approaches to correction techniques

a: rule based reasoning b: model based reasoning

c: case based reasoning d: codebook

e: state transition graph model f: finite state machine model

Ans: ___________ (a/b/c/d/e/f/all)

Page 73: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

73

45>Rule based reasoning is also known as___________ (rule based expert system/expert system, production system

and blackboard system/all)

46>RBR stands for___________

47>In RBR, following levels represent the different components

a: data level

b: control level

c: knowledge level

Ans: ___________ (a/b/c/all)

48>In RBR, the knowledge base contains expert knowledg as to

a: definition of a problem in the network

b: action that needs to be taken if a particular condition occurs

Ans: ___________ (a/b/both)

49>In RBR, the knowledge base information is rule-based in the form of___________ (if then/condition

action/either)

50>If the antecedent and action in the rule do not match, the paradigm breaks and it is called___________

(breakdown/brittle)

51>If the antecedent and action in the rule do not match, the paradigm. However, it can be fixed by adding more

rules, but doing so increases the database size and degrades performance called___________ (knowledge acquire

bottleneck/knowledge acquisition bottleneck)

52>In___________ based reasoning, an event correlator is built on an object oriented model associated with each

managed object (rule/model/case)

53>CBR stands for___________

54>In_____, the unit of knowledge is a rule whereas in______, the unit of knowledge is a case (case/rule/model)

55>The intuition of___________ based reasoning is that situations repeat themselves in the real world and that

what was done in one situation is applicable to others in a similar, but not necessarily identical, situation

(rule/case/model)

56>___________approach uses knowledge gained previously and extends it to the current situation (rule/case)

57>In CBR, the current trouble is resolved by adapting the previous case in one of following ways

a: parameterized adaptation

b: abstraction/respecialization adaptation

c: critic based adaptation

Ans: ___________ (a/b/c/all)

58>___________adaptation is used when a similar case exists in the case library, but the parameters may have to be

scaled to resolve the current situation (critic/abstraction/parameterized)

59>In___________ based adaptation, a critic or craft person decides to add, remove, reorder or replace an existing

solution (critic/abstraction/parameterized)

60>The core modules of CRITTER as

a: input

b: retrieve

c: adapt

d: process

Ans: ___________ (a/b/c/d/all)

61>The CRITTER application has evolved into a CBR application for network management named___________

(Spectrum/SpectroRx)

62>In_____, the retrieval is based on an exact match whereas in______, the retrieval is based on a partial match

(RBR/CBR)

63>_____is applied to an iterative cycle of micro-events, but ______is applied as a total solution to the trouble and

then adapted to the current situation (RBR/CBR)

64>In___________ model, problem events are viewed as messages generated by a system and encoded in sets of

alarms that they cause (state transition graph/codebook correlation/finite state machine)

65>SMARTS stands for___________

66>___________model is used in Seagate's NerveCenter correlation system (state transition graph/codebook

correlation)

67>The main feature of___________ model is that it is a passive testing system based on the assumption that an

observer agent is present in each node and reports abnormalities to a central point (state transition graph/codebook

correlation/finite state machine)

68>The main difference between finite state machine and state transition graph model is that former is____ system

and that the latter is _______system (active/passive)

69>Security management is ___________consideration in information management (technical/administrative/both)

70>Following are different types of security threats to network management

a: modification of information b: masquerade

c: message stream modification d: disclosure

Page 74: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

74

Ans: ___________ (a/b/c/d/all)

71>The SNMPv___ security subsystem is the USM (1/2/3)

72>USM stands for___________

73>USM has following modules: ___________ (authentication/privacy/both)

74>_____addresses data integrity and data origin .______is concerned with data confidentiality, message timeliness

and limited message protection (authentication/privacy)

75>An enterprise's policy should address both access and security breaches (true/false)___________

76>The IETF workgroup that generated RFC=____defines a security policy as "a formal statement of the rules by

which people who are given access to an organization’s technology and information assents must abide"

(2169/2196)

77>NCSC stands for___________

78>NCSC has published what is known as ___________book, which contains a rating scheme for computers and is

a framework for setting security policies and procedures (red/orange/blue)

79>A basic guide for setting up policies and procedures includes the following

a: identify what you are trying to protect

b: determine what you are trying to protect it from

c: determine how likely the threats are

d: implement measures that will protect your assets in a cost-effective manner

e: review the process continuously and make improvements if weaknesses are found

Ans: ___________ (a/b/c/d/e/all)

80>____________is used to screen traffic going in and out of the secure network (firewall/filter)

81>The main purpose of ___________is to protect a network from external attacks (firewall/filter)

82>Firewall can be implemented in a router, gateway or special host (true/false)___________

83>Following are benefits of implementing a firewall to a network

a: it reduces the risk of access to hosts from an external network by filtering insecure services

b: it can provide controlled access to the network so that only specified hosts or network segments can access some

hosts

c: it reduces the annoyance to internal users while controlling the external users

Ans: ___________ (a/b/c/all)

84>___________is based on protocol specific criteria (packet filtering/application gateway)

85>___________is done at the OSI data link, network and transport layers (packet filtering/application gateway)

86>Packet filters are implemented in some commercial routers called___________ (screening routers/packet

filtering routers/either)

87>Packet filtering is done on the following parameters

a: source &destination IP address

b: source &destination TCP/UDP port

Ans: ___________ (a/b/both)

88>Testing and debugging are difficult in___________ (packet filtering/application gateway)

89>___________makes sure that information has not been tampered with as it mves between source and

destination.__________ verifies originator identification (integrity protection/authentication validation)

90>___________means secret writing (cryptanalysis/cryptography)

91>___________deals with techniques of transmitting information from a sender to a receiver w/o any intermediary

being able to decipher it (cryptanalysis/cryptography)

92>In__________ cipher, each letter is replaced with another letter, which is three letters latter in the alphabet

(monoalphabetic/caesar)

93>In___________ cipher, each letter is replaced uniquely with another letter that is randomly chosen

(polyalphabetic/monoalphabetic)

94>DES uses___ bit key and IDEA uses ____bit key (56/64/128)

95>______is designed for efficient hardware implementation and consequently performs poorly if implemented in

software. In contrast, _____functions efficiently in software implementations (IDEA/DES)

96>In____ key cryptography, each pair of users must have a secret key (public/private)

97>In___________ cryptography, the same key is use for encryption and decryption (secret/public)

98>The secret key cryptography is ___________ (symmetric/asymmetric)

99>The Diffie Hellman algorithm is the oldest___________ key algorithm (secret/public)

100>RSA is___________ efficient than either of the secret key algorithms, DES or IDEA (less/more)

101>__________involves calculating a checksum based on the data in the frame or packet at the sending end and

transmitting it along with the data (MD5/CRC)

102>__________takes as input a message of arbitrary length producing output consisting of a 128 bit message

digest of the input (SHS/MD5 utility)

103>__________can handle a maximum message length of 2^64 bits (SHS/MD5)

104>_____produces a 160 bit output whereas _____output is 128 bits long (SHS/MD5)

105>Following are features of message digest

Page 75: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

75

a: there is a one-to-one relationship between the input and output messages

b: output digest is of constant length for a given algorithm with chosen parameters, irrespective of the input

message length

c: generation of a message digest is a one way function

Ans: __________ (a/b/c/all)

106>The digital signature is the reverse of __________key cryptography (secret/public)

107>_____is verification of the user's identification, and _____is the granting of access of the information

(authorization/authentication)

108>Following are different types client/server environments and the implementation of authentication in each

a: host/user environment

b: ticket-granting system

c: authentication server system

d: authentication using a cryptographic function

Ans: __________ (a/b/c/d/all)

109>Kerberos consists of an authentication server and a ticket granting server (true/false)__________

110>Following are different secure mail systems

a: PEM

b: PGP

c: X.400 based mail system

Ans: __________ (a/b/c/all)

111>PEM stands for__________

112>PEM services include

a: confidentiality

b: authentication

c: message integrity assurance

d: non-repudiation of origin

Ans: __________ (a/b/c/d/all)

113>Following are PEM processes based on message integrity and encryption

a: MIC-CLEAR

b: MIC-ONLY

c: ENCRYPTED

Ans: __________ (a/b/c/all)

114>In PEM, the specification provides following types of keys__________ (DEK/IK/both)

115>DEK stands for___________

116>__________is a secure mail package developed by Phil Zimmerman that is available in the public domain

(PGP/PEM)

117>IDEA i ________efficient than RSA (less/more)

118>PGP is similar to__________ PEM (ENCRYPTED/DECRYPTED)

119>The main difference between PGP & PEM is how the _______key is administered (secret/public)

120>__________are programs that, when executed, cause harm by making copies and inserting them into other

programs (worms/viruses)

121>Accounting management is probably the__________ developed network management application (most/least)

122>Reports can be classified into

a: planning and management reports

b: system reports

c: user reports

Ans: __________ (a/b/c/all)

123>__________reports keep upper-level management apprised of the status of network and system operations

(planning-management/system/user)

124>Match the following

Qos/service level agreement : function , use, personnel

traffic trends : current status, technology needs projection

technology trends : network &system availability, problem reports, service response

cost of operations : traffic patterns , analysis of internal &external traffic volume

125>Match the following

Traffic : network/servers, applications

Failures : traffic load internal & external

Performance : network & system failures

126>The engineering and operations functions require _________oriented reports (application/operation)

127>Service level management is defined as the process of

a: identifying services and characteristics associated with them

Page 76: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

76

b: negotiating a service level agreement

c: deploying agents to monitor and control network , system and application component performance

d: producing service level reports___________

128>OMG stands for__________

129>SLA stands for___________

130>_________is a contract between the service provider and the customer, specifying the services to be provided

and the quality of those services that the service provider promises to meet (SLA/SHS)

131>The objective of___________ management is to ensure customer satisfaction by meeting or exceeding the

commitments made in the SLA and to guide policy management (service/configuration/performance)

132>Following are different categories of OSI application functions

a: configuration

b: fault

c: performance

d: security

e: accounting

Ans: ___________ (a/b/c/d/e/all)

133>__________management involves setting & resetting the parameters of network components, and network

provisioning & inventory management (configuration/performance)

134>Fault detection consists of__________ (fault detection/fault isolation/both)

135>Following are different classes of management of info service reports__________ (planning&

management/system/user/all)

ANSWERS

1>both

2>5

3>business

4>third

5>fourth

6>all

7>fault

8>network

9>accounting

10>network, service

11>configuration

12>configuration

13>circuit

14>trunk

15>system of system

16>Trunk Integrated Record Keeping System

17>Telecommunications Management Network

18>TIRKS

19>connectionless

20>store&forward

21>connection oriented

22>all

23>all

24>all

25>either

26>traps, polling

27>artificial intelligence

28>protocol analyzer

29>performance

30>all

31>both

32>T

33>all

34>2063

35>all

36>all

37>trap

38>performance statistics

39>Service Level Agreement

Page 77: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

77

40>jitter

41>receiving an event

42>event correlation

43>all

44>all

45>all

46>Rule Based Reasoning

47>all

48>all

49>either

50>brittle

51>knowledge acquisition bottleneck

52>model

53>Case Based Reasoning

54>RBR,CBR

55>case

56>CBR

57>all

58>parameterized adaptation

59>critic

60>all

61>SpectroRx

62>RBR,CBR

63>RBR,CBR

64>codebook correlation

65>System Management ARTS

66>state transition graph

67>finite state machine

68>passive, active

69>both

70>all

71>3

72>User Based Security Model

73>both

74>authentication module, privacy module

75>T

76>2196

77>National Computer Security Center

78>Orange

79>all

80>firewall

81>firewall

82>T

83>all

84>packet filtering

85>packet filtering

86>either

87>both

88>packet filtering

89>integrity protection, authentication validation

90>cryptography

91>cryptography

92>caesar

93>mono-alphabetic

94>56,128

95>DES, IDEA

96>private

97>secret

98>symmetric

99>public

100>less

101>CRC

Page 78: MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS

NETWORK MANAGEMENT SYSTEMS

78

102>MD2 utility

103>SHS

104>SHS,MD5

105>all

106>public

107>authentication, authorization

108>all

109>T

110>all

111>Privacy Enhanced Mail

112>all

113>all

114>both

115>Data Encrypting Key

116>PGP

117>more

118>ENCRYPTED

119>public

120>virus

121>least

122>all

123>planning & management

124>1-c 2-d 3-b 4-a

125>1-b 2-c 3-a

126>operation

127>all

128>Object Modeling Group

129>Service Level Agreement

130>SLA

131>service

132>all

133>configuration

134>both

135>all